|
Volumn 2513, Issue , 2002, Pages 1-12
|
Defenses against the truncation of computation results of free-roaming agents
|
Author keywords
Agent route protection; Cryptographic protocols; Malicious host; Mobile agent security; Truncation attack
|
Indexed keywords
ARTIFICIAL INTELLIGENCE;
COMPUTER SCIENCE;
COMPUTERS;
CRYPTOGRAPHIC PROTOCOLS;
MALICIOUS HOST;
MOBILE AGENT SECURITY;
MUTUAL AUTHENTICATION;
PARTIAL COMPUTATION;
PARTIAL RESULTS;
THRESHOLD NUMBERS;
TRUNCATION ATTACK;
MOBILE AGENTS;
|
EID: 84944079908
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/3-540-36159-6_1 Document Type: Conference Paper |
Times cited : (33)
|
References (8)
|