메뉴 건너뛰기




Volumn 1267, Issue , 1997, Pages 230-241

Sliding encryption: A cryptographic tool for mobile agents

Author keywords

Applets; Cryptoviruses; Mobile computing; Mode of operation; Network computing; Network software agents; Public key; RSA; Sliding encryption; Smartcards; Space efficient encryption; Spiders; Viruses; Worms; WWW

Indexed keywords

COMPUTER VIRUSES; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; MOBILE COMPUTING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SMART CARDS; SURVEYS; VIRUSES; WORLD WIDE WEB;

EID: 84947927799     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0052350     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 2
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • Feb [Cha81]
    • D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. In Communications of the ACM, v. 24, n. 2, Feb 1981, pages 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 85032883059 scopus 로고
    • A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • SpringerVerlag, [E185]
    • T. ElGamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In Advances in Cryptology-CRYPTO '84, SpringerVerlag, pages 10-18, 1985.
    • (1985) Advances in Cryptology-CRYPTO '84 , pp. 10-18
    • ElGamal, T.1
  • 10
    • 0017930809 scopus 로고
    • A method for obtaining Digital Signatures and Public-Key Cryptosystems
    • [RSA78]
    • R. Rivest, A. Shamir, L. Adleman. A method for obtaining Digital Signatures and Public-Key Cryptosystems. In Communications of the ACM, v. 21, n. 2, pages 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 12
    • 33846063041 scopus 로고    scopus 로고
    • Covert Distributed Processing with Computer Viruses
    • [Wh89]
    • S.R. White, Covert Distributed Processing with Computer Viruses. In Proceedings of the Crypto 89, pages 616-619.
    • Proceedings of the Crypto 89 , pp. 616-619
    • White, S.R.1
  • 13
  • 14
    • 0029705858 scopus 로고    scopus 로고
    • Cryptovirology: Extortion-Based Security Threats and Countermeasures
    • IEEE Computer Society Press, [YY96]
    • A. Young, M. Yung. Cryptovirology: Extortion-Based Security Threats and Countermeasures. In Proceedings of the 1996 IEEE Symp. on Security and Privacy, IEEE Computer Society Press, pages 129-140, 1996.
    • (1996) Proceedings of the 1996 IEEE Symp. on Security and Privacy , pp. 129-140
    • Young, A.1    Yung, M.2
  • 15
    • 84947780688 scopus 로고    scopus 로고
    • Agent Rendezvous: A Dynamic Symmetry-Breaking Problem
    • Lecture Notes in Computer Science, Springer, July [YuYu96]
    • X. Yu, M. Yung. Agent Rendezvous: A Dynamic Symmetry-Breaking Problem. In Proceedings of the 1996 ICALP. Lecture Notes in Computer Science, Springer, July 1996.
    • (1996) Proceedings of the 1996 ICALP
    • Yu, X.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.