-
1
-
-
0004802540
-
-
it + ti - Oldenbourg Verlag
-
F. Mattern: 'Mobile Agenten', it + ti - Oldenbourg Verlag, 1998, 4, pp.12-17.
-
(1998)
Mobile Agenten'
, vol.4
, pp. 12-17
-
-
Mattern, F.1
-
2
-
-
84944074102
-
-
W. Ernestus, D. Ermer, M. Hube, M. Kohntopp, M. Knorr, G. Quiring-Kock, U. Schlager, G. Schulz: 'Datenschutzfreundliche Technologien', DuD 21, 1997, 12, pp.709-715.
-
(1997)
Datenschutzfreundliche Technologien', Dud
, vol.21
, Issue.12
, pp. 709-715
-
-
Ernestus, W.1
Ermer, D.2
Hube, M.3
Kohntopp, M.4
Knorr, M.5
Quiring-Kock, G.6
Schlager, U.7
Schulz, G.8
-
3
-
-
0001636051
-
Authentication for Mobile Agents
-
Springer Verlag, LNCS 1419
-
S. Berkovits, J. Guttman, V. Swarup: 'Authentication for Mobile Agents', in 'Mobile Agents and Security', Proceedings, Springer Verlag, LNCS 1419, 1998, pp.114-136.
-
(1998)
'Mobile Agents and Security', Proceedings
, pp. 114-136
-
-
Berkovits, S.1
Guttman, J.2
Swarup, V.3
-
4
-
-
0002380598
-
'Security Issues in Mobile Code Systems
-
Verlag, LNCS 1419
-
D. Chess: 'Security Issues in Mobile Code Systems', in 'Mobile Agents and Security', Proceedings, Springer Verlag, LNCS 1419, 1998, pp.1-14.
-
(1998)
'Mobile Agents and Security', Proceedings
, pp. 1-14
-
-
Chess, D.1
-
6
-
-
0002717089
-
'Cryptographic Traces for Mobile Agents
-
Springer Verlag, LNCS 1419
-
G. Vigna: 'Cryptographic Traces for Mobile Agents', in 'Mobile Agents and Security', Proceedings, Springer Verlag, LNCS 1419, 1998, pp.138-153.
-
(1998)
Mobile Agents and Security', Proceedings
, pp. 138-153
-
-
Vigna, G.1
-
7
-
-
84949751564
-
'Security for Mobile Agents: Authentication and State Appraisal
-
Springer Verlag, LNCS 1146
-
W.M. Farmer, J. Guttman, V. Swarup: 'Security for Mobile Agents: Authentication and State Appraisal', in 'Proc. of the 4th European Symp. on Research in Computer Security', Springer Verlag, LNCS 1146, 1996, pp.118-130.
-
(1996)
Proc of the 4Th European Symp on Research in Computer Security
, pp. 118-130
-
-
Farmer, W.M.1
Guttman, J.2
Swarup, V.3
-
8
-
-
2642533128
-
-
Technical report, Ecole Polytechnique Federale de Lausanne, Switzerland
-
U.G. Wilhelm: 'Cryptographically protected Objects'. Technical report, Ecole Polytechnique Federale de Lausanne, Switzerland, 1997.
-
(1997)
'Cryptographically Protected Objects'
-
-
Wilhelm, U.G.1
-
9
-
-
0003197918
-
Protecting Mobile Agents Against Malicious Hosts
-
Proceedings, Springer Verlag, LNCS 1419
-
T. Sander, C. Tschudin: 'Protecting Mobile Agents Against Malicious Hosts', in 'Mobile Agents and Security', Proceedings, Springer Verlag, LNCS 1419, 1998, pp.44-60.
-
(1998)
Mobile Agents and Security
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.2
-
10
-
-
0001943763
-
Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts
-
Springer Verlag, LNCS 1419
-
F. Hohl: 'Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts', in 'Mobile Agents and Security', Proceedings, Springer Verlag, LNCS 1419, 1998, pp.92-113.
-
(1998)
Mobile Agents and Security', Proceedings
, pp. 92-113
-
-
Hohl, F.1
-
11
-
-
0032074579
-
Anonymous Connections and Onion Routing
-
M.G. Reed, P.F. Syverson, D.M. Goldschlag: 'Anonymous Connections and Onion Routing', in 'IEEE Journal on Selected Areas in Communication - Special Issue on Copyright and Privacy Protection', Vol. 16, No. 4, 1998, pp.482-494.
-
(1998)
IEEE Journal on Selected Areas in Communication - Special Issue on Copyright and Privacy Protection'
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
12
-
-
0017930809
-
'A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
February
-
R. Rivest, A. Shamir, L. Adleman: 'A Method for Obtaining Digital Signatures and Public-Key Cryptosystems' in 'Communication of ACM', Volume 21, Number 2, February 1978, pp.120-126.
-
(1978)
'Communication of ACM'
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
13
-
-
0031650188
-
-
Security and Privacy, IEEE Computer Society Press, Los Alamitos
-
N. Asokan, V. Shoup, M. Waidner: 'Asynchronous Protocols for Optimistical Fair Exchange', 1998 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos 1998, pp.86-99.
-
(1998)
'Asynchronous Protocols for Optimistical Fair Exchange', 1998 IEEE Symposium on Research
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
14
-
-
84947931007
-
Investigation of Non-repudiation Protocols
-
Springer Verlag, LNCS 1172
-
Y. Han: 'Investigation of Non-repudiation Protocols', in 'Information Security and Privacy', Proceedings of ACISP'96, Springer Verlag, LNCS 1172, 1996, pp.38-47.
-
(1996)
Information Security and Privacy', Proceedings of ACISP'96
, pp. 38-47
-
-
Han, Y.1
|