-
1
-
-
2342477274
-
Efficient access control and key management schemes for mobile agents
-
10.1016/j.csi.2003.11.010
-
Lin I. C.; Ou H. H.; Hwang M. S.: Efficient access control and key management schemes for mobile agents. Computer Standards & Interfaces 26(5), 423-433 (2004)
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 423-433
-
-
Lin, I.C.1
Ou, H.H.2
Hwang, M.S.3
-
3
-
-
0035917655
-
Mobile agents: An introduction
-
10.1016/S0141-9331(01)00099-0
-
Gian P. P.: Mobile agents: An introduction. Microprocessors and Microsystems 25(2), 65-74 (2001)
-
(2001)
Microprocessors and Microsystems
, vol.25
, Issue.2
, pp. 65-74
-
-
Gian, P.P.1
-
4
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
2388983 1186.68157 10.1016/j.ipl.2007.09.007
-
Biskup J.; Embley D. W.; Lochner J. H.: Reducing inference control to access control for normalized database schemas. Information Processing Letters 106, 8-12 (2008)
-
(2008)
Information Processing Letters
, vol.106
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.H.3
-
5
-
-
33746169048
-
Secure brokerage mechanisms for mobile electronic commerce
-
10.1016/j.comcom.2006.03.005
-
Esparza O.; Muñoz J. L.; Soriano M.; Forné J.: Secure brokerage mechanisms for mobile electronic commerce. Computer Communications 29(12), 2308-2321 (2006)
-
(2006)
Computer Communications
, vol.29
, Issue.12
, pp. 2308-2321
-
-
Esparza, O.1
Muñoz, J.L.2
Soriano, M.3
Forné, J.4
-
6
-
-
79953730258
-
An agent-based English auction protocol using elliptic curve cryptosystem for mobile commerce
-
10.1016/j.eswa.2011.02.039
-
Chung Y. F.; Chen Y. T.; Chen T. L.; Chen T. S.: An agent-based English auction protocol using elliptic curve cryptosystem for mobile commerce. Expert Systems with Applications 38(8), 9900-9907 (2011)
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.8
, pp. 9900-9907
-
-
Chung, Y.F.1
Chen, Y.T.2
Chen, T.L.3
Chen, T.S.4
-
8
-
-
34250306664
-
Threshold cryptography in P2P and MANETs: The case of access control
-
1118.68484 10.1016/j.comnet.2007.03.001
-
Saxena N.; Tsudik G.; Yi J. H.: Threshold cryptography in P2P and MANETs: The case of access control. Computer Networks 51(12), 3632-3649 (2007)
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3632-3649
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
9
-
-
33646842835
-
HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems
-
10.1016/j.compbiomed.2005.04.010
-
Orgun B.; Vu J.: HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems. Computers in Biology and Medicine 36(7-8), 817-836 (2006)
-
(2006)
Computers in Biology and Medicine
, vol.36
, Issue.7-8
, pp. 817-836
-
-
Orgun, B.1
Vu, J.2
-
10
-
-
84873031582
-
An efficient key-management scheme for hierarchical access control in E-medicine system
-
doi: 10.1007/s10916-011-9700-7
-
Wu S.; Chen K. (2011) An efficient key-management scheme for hierarchical access control in E-medicine system. Journal of Medical Systems. doi: 10.1007/s10916-011-9700-7.
-
(2011)
Journal of Medical Systems.
-
-
Wu, S.1
Chen, K.2
-
12
-
-
84964820465
-
Security issues in mobile agent technology
-
IEEE Computer Society Press, Cape Town, South Africa
-
Corradi, A.; Montanari, R.; & Stefanelli, C. (1999). Security issues in mobile agent technology. In Proceedings of the 7th IEEE workshop on future trends of distributed computing systems (FTDCS '99), IEEE Computer Society Press, Cape Town, South Africa, pp. 3-8.
-
(1999)
Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '99)
, pp. 3-8
-
-
Corradi, A.1
Montanari, R.2
Stefanelli, C.3
-
14
-
-
0032121340
-
Access control and key management for mobile agents
-
10.1016/S0097-8493(98)00035-1
-
Volker R.; Mehrdad J. S.: Access control and key management for mobile agents. Computers Graphics 22(4), 457-461 (1998)
-
(1998)
Computers Graphics
, vol.22
, Issue.4
, pp. 457-461
-
-
Volker, R.1
Mehrdad, J.S.2
-
15
-
-
32644451622
-
A new solution for assigning cryptographic keys to control access in mobile agent environments
-
10.1002/wcm.276
-
Chang C. C.; Lin I. C.: A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6, 137-146 (2006)
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, pp. 137-146
-
-
Chang, C.C.1
Lin, I.C.2
-
17
-
-
0043135196
-
Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
-
498191 10.1016/S1363-4127(97)81331-3
-
Vanstone S. A.: Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Information Security Technical Report 2(2), 78-87 (1997)
-
(1997)
Information Security Technical Report
, vol.2
, Issue.2
, pp. 78-87
-
-
Vanstone, S.A.1
-
19
-
-
71649115708
-
Performance evaluation for conventional and MMSE multiuser detection algorithms in imperfect reception conditions
-
10.1016/j.dsp.2009.05.005
-
Halunga S. V.; Vizireanu N.: Performance evaluation for conventional and MMSE multiuser detection algorithms in imperfect reception conditions. Digital Signal Processing 20, 166-178 (2010)
-
(2010)
Digital Signal Processing
, vol.20
, pp. 166-178
-
-
Halunga, S.V.1
Vizireanu, N.2
-
20
-
-
71649106735
-
Imperfect cross-correlation and amplitude balance effects on conventional multiuser decoder with turbo encoding
-
10.1016/j.dsp.2009.05.007
-
Halunga S. V.; Vizireanu N.; Fratu O.: Imperfect cross-correlation and amplitude balance effects on conventional multiuser decoder with turbo encoding. Digital Signal Processing 20, 191-200 (2010)
-
(2010)
Digital Signal Processing
, vol.20
, pp. 191-200
-
-
Halunga, S.V.1
Vizireanu, N.2
Fratu, O.3
-
21
-
-
84879692239
-
High speed modular divider based on GCD algorithm, Lecture notes in computer science
-
Abdulah Zadeh, A. (2007). High speed modular divider based on GCD algorithm, Lecture notes in computer science. In Information and Communications Security (Vol. 4861, pp. 189-200).
-
(2007)
Information and Communications Security
, vol.4861
, pp. 189-200
-
-
Abdulah Zadeh, A.1
-
24
-
-
77956061440
-
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
-
10.1016/j.jss.2010.05.072
-
Nikooghadam M.; Zakerolhosseini A.; Ebrahimi Moghadam M.: Efficient utilization of elliptic curve cryptosystem for hierarchical access control. The Journal of Systems and Software 83(10), 1917-1929 (2010)
-
(2010)
The Journal of Systems and Software
, vol.83
, Issue.10
, pp. 1917-1929
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
Ebrahimi Moghadam, M.3
-
25
-
-
46149115413
-
A protocol for digital signature based on the elliptic curve discrete logarithm problem
-
10.3923/jas.2008.1919.1925
-
Nikooghadam M.; Bonyadi M. R.; Malekian E.; Zakerolhosseini A.: A protocol for digital signature based on the elliptic curve discrete logarithm problem. Journal of Applied Sciences 8(10), 1919-1925 (2008)
-
(2008)
Journal of Applied Sciences
, vol.8
, Issue.10
, pp. 1919-1925
-
-
Nikooghadam, M.1
Bonyadi, M.R.2
Malekian, E.3
Zakerolhosseini, A.4
-
26
-
-
79551551986
-
An efficient key management scheme for mobile agents in distributed networks
-
Nikooghadam, M, Safaei, F. & Zakerolhosseini, A. (2010). An efficient key management scheme for mobile agents in distributed networks, In IEEE, 1st international conference on parallel, distributed and grid computing.
-
(2010)
IEEE, 1st International Conference on Parallel, Distributed and Grid Computing
-
-
Nikooghadam, M.1
Safaei, F.2
Zakerolhosseini, A.3
-
29
-
-
79751531498
-
Secure key management scheme for dynamic hierarchical access control based on ECC
-
10.1016/j.jss.2010.11.926
-
Lin Y. L.; Hsu C. L.: Secure key management scheme for dynamic hierarchical access control based on ECC. The Journal of Systems and Software 84(4), 679-685 (2011)
-
(2011)
The Journal of Systems and Software
, vol.84
, Issue.4
, pp. 679-685
-
-
Lin, Y.L.1
Hsu, C.L.2
-
30
-
-
79951947591
-
A new untraceable off-line electronic cash system
-
10.1016/j.elerap.2010.08.002
-
Eslami Z.; Talebi M.: A new untraceable off-line electronic cash system. Electronic Commerce Research and Applications 10(1), 59-66 (2011)
-
(2011)
Electronic Commerce Research and Applications
, vol.10
, Issue.1
, pp. 59-66
-
-
Eslami, Z.1
Talebi, M.2
-
31
-
-
0348003132
-
The state of elliptic curve cryptography
-
1759616 0996.94032 10.1023/A:1008354106356
-
Koblitz N.; Menezes A.; Vanstone S. A.: The state of elliptic curve cryptography. Designs, Codes, and Cryptography 19(2), 173-193 (2000)
-
(2000)
Designs, Codes, and Cryptography
, vol.19
, Issue.2
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.A.3
-
34
-
-
48149084445
-
A secure mobile electronic payment architecture platform for wireless mobile networks
-
10.1109/TWC.2008.070111
-
Lin P.; Chen H. Y.; Fang Y.; Jeng J. Y.; Lu F. S.: A secure mobile electronic payment architecture platform for wireless mobile networks. IEEE Transactions on Wireless Communications 7(7), 2705-2713 (2008)
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.7
, pp. 2705-2713
-
-
Lin, P.1
Chen, H.Y.2
Fang, Y.3
Jeng, J.Y.4
Lu, F.S.5
-
35
-
-
84856751444
-
A low computational-cost electronic payment scheme for mobile commerce with large-scale mobile users
-
doi: 10.1007/s11277-010-0109-2
-
Yang, J. H.; & Chang, C. C. (2010). A low computational-cost electronic payment scheme for mobile commerce with large-scale mobile users. Wireless Personal Communication. doi: 10.1007/s11277-010-0109-2, pp. 83-99.
-
(2010)
Wireless Personal Communication
, pp. 83-99
-
-
Yang, J.H.1
Chang, C.C.2
|