메뉴 건너뛰기




Volumn 4308 LNCS, Issue , 2006, Pages 1-14

Distributed security algorithms by mobile agents

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL PARADIGM; COMPUTING ENVIRONMENTS; DISTRIBUTED SECURITY; MESSAGE-PASSING SETTINGS; MOBILE AGENTS SYSTEMS; PROBLEMS AND SOLUTIONS; PROGRAMMING PARADIGMS; SELFISH BEHAVIOURS;

EID: 84885235586     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11947950_1     Document Type: Conference Paper
Times cited : (8)

References (56)
  • 3
    • 0003337684 scopus 로고    scopus 로고
    • A method of tracing intruders by use of mobile agent
    • M. Asaka, S. Okazawa, A. Taguchi, S. Goto. "A method of tracing intruders by use of mobile agent". INET, www.isoc.org, 1999.
    • (1999) INET
    • Asaka, M.1    Okazawa, S.2    Taguchi, A.3    Goto, S.4
  • 23
    • 84885215250 scopus 로고    scopus 로고
    • Searching for a black hole in arbitrary networks: Optimal mobile agents protocols
    • to appear
    • S. Dobrev, P. Flocchini, G. Prencipe, N. Santoro. "Searching for a black hole in arbitrary networks: optimal mobile agents protocols". Distributed Computing, to appear.
    • Distributed Computing
    • Dobrev, S.1    Flocchini, P.2    Prencipe, G.3    Santoro, N.4
  • 30
  • 36
    • 33745903272 scopus 로고    scopus 로고
    • Intrusion detection with mobile agents
    • N. Foukia, J. G. Hulaas, J. Harms. "Intrusion Detection with Mobile Agents". INET, www.isoc.org, 2001.
    • (2001) INET
    • Foukia, N.1    Hulaas, J.G.2    Harms, J.3
  • 41
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • LNCS 1419
    • F. Hohl. "Time limited blackbox security: Protecting mobile agents from malicious hosts". In Proc. of Conf on Mobile Agent Security, LNCS 1419, pages 92-113, 1998.
    • (1998) Proc. of Conf on Mobile Agent Security , pp. 92-113
    • Hohl, F.1
  • 47
    • 0027577361 scopus 로고
    • Recontamination does not help to search a graph
    • A. Lapaugh. "Recontamination does not help to search a graph". Journal of the ACM 40(2), 224-245, 1993.
    • (1993) Journal of the ACM , vol.40 , Issue.2 , pp. 224-245
    • Lapaugh, A.1
  • 50
    • 0032665338 scopus 로고    scopus 로고
    • Security issues related to mobile code and agent-based systems
    • R. Oppliger. "Security issues related to mobile code and agent-based systems". Computer Communications, 22(12):1165-1170, 1999.
    • (1999) Computer Communications , vol.22 , Issue.12 , pp. 1165-1170
    • Oppliger, R.1
  • 51
    • 0000049929 scopus 로고    scopus 로고
    • Exploring unknown undirected graphs
    • P. Panaite, A. Pelc, "Exploring unknown undirected graphs". Journal of Algorithms, 33 281-295, 1999.
    • (1999) Journal of Algorithms , vol.33 , pp. 281-295
    • Panaite, P.1    Pelc, A.2
  • 52
    • 0034259971 scopus 로고    scopus 로고
    • Impact of topographic information on graph exploration efficiency
    • P. Panaite, A. Pelc. "Impact of topographic information on graph exploration efficiency". Networks, 36, 96-103, 2000.
    • (2000) Networks , vol.36 , pp. 96-103
    • Panaite, P.1    Pelc, A.2
  • 55
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion detection using autonomous agents
    • E. H. Spafford, D. Zamboni. "Intrusion detection using autonomous agents". Computer Networks, 34(4):547-570, 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 547-570
    • Spafford, E.H.1    Zamboni, D.2
  • 56
    • 0012526412 scopus 로고    scopus 로고
    • Mobile computations and hostile hosts
    • D. Tsichritzis, editor University of Geneva
    • J. Vitek, G. Castagna. "Mobile computations and hostile hosts". In D. Tsichritzis, editor, Mobile Objects, pages 241-261. University of Geneva, 1999.
    • (1999) Mobile Objects , pp. 241-261
    • Vitek, J.1    Castagna, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.