메뉴 건너뛰기




Volumn 2, Issue , 2000, Pages 1165-1166

POM - A mobile agent security model against malicious hosts

Author keywords

[No Author keywords available]

Indexed keywords

LAW ENFORCEMENT;

EID: 84905914152     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HPC.2000.843621     Document Type: Conference Paper
Times cited : (25)

References (7)
  • 2
    • 0003197918 scopus 로고    scopus 로고
    • Protecting Mobile Agents Against Malicious Hosts
    • G. Vigna (Ed.) Springer-Verlag
    • T. Sander and C. Tschudin, "Protecting Mobile Agents Against Malicious Hosts", G. Vigna (Ed.): Mobile Agents and Security, Springer-Verlag, 1998, pp. 44-60.
    • (1998) Mobile Agents and Security , pp. 44-60
    • Sander, T.1    Tschudin, C.2
  • 3
    • 0001943763 scopus 로고    scopus 로고
    • Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
    • G. Vigna (Ed.) Springer-Verlag
    • F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts", G. Vigna (Ed.): Mobile Agents and Security, Springer-Verlag, 1998, pp. 92-113.
    • (1998) Mobile Agents and Security , pp. 92-113
    • Hohl, F.1
  • 7
    • 79251589439 scopus 로고    scopus 로고
    • POM - A Security Model against Malicious Hosts
    • Shanghai Jiaotong Univ. Dec.
    • X. D. Guan, Y. L. Yang, and J. Y. You, "POM - A Security Model against Malicious Hosts", DCTC Tech Report, Shanghai Jiaotong Univ. Dec. 1999. URL: http://gxd.home.chinaren.net/tr-dctc-pom(1999-7-pages).zip
    • (1999) DCTC Tech Report
    • Guan, X.D.1    Yang, Y.L.2    You, J.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.