-
1
-
-
19144369108
-
Programming Satans computer,”
-
Springer Verlag
-
R. Anderson and R. Needham, “Programming Satan’s computer,” in Computer Science Today, vol. 1000 of Lecture Notes in Computer Science, pp. 426–441, Springer Verlag, 1995.
-
(1995)
Computer Science Today, Vol. 1000 of Lecture Notes in Computer Science
, vol.2240
, pp. 426-441
-
-
Anderson, R.1
Needham, R.2
-
3
-
-
0042849357
-
-
Technical Report TR-5-99, University of Minnesota, Minneapolis, MN 55455, U. S. A., May
-
N. M. Karnik and A. R. Tripathi, “Security in the Ajanta mobile agent system,” Technical Report TR-5-99, University of Minnesota, Minneapolis, MN 55455, U. S. A., May 1999.
-
(1999)
Security in the Ajanta Mobile Agent System
-
-
Karnik, N.M.1
Tripathi, A.R.2
-
4
-
-
0033332886
-
Mobile agents protection in the Internet environment
-
A. Corradi, R. Montanari, and C. Stefanelli, “Mobile agents protection in the Internet environment,” in The 23rd Annual International Computer Software and Applications Conference (COMPSAC’99), pp. 80–85, 1999.
-
(1999)
The 23Rd Annual International Computer Software and Applications Conference (COMPSAC’99)
, vol.2240
, pp. 80-85
-
-
Corradi, A.1
Montanari, R.2
Stefanelli, C.3
-
5
-
-
84867313902
-
Protecting the computation results of free-roaming agents
-
K. Rothermel and F. Hohl, eds, Berlin Heidelberg: Springer Verlag, September
-
G. Karjoth, N. Asokan, and C. Gülcü, “Protecting the computation results of free-roaming agents,” in Proceedings of the Second International Workshop on Mobile Agents (MA’98) (K. Rothermel and F. Hohl, eds.), vol. 1477 of Lecture Notes in Computer Science, pp. 195–207, Berlin Heidelberg: Springer Verlag, September 1998.
-
(1998)
Proceedings of the Second International Workshop on Mobile Agents (MA’98)
, vol.1477
, pp. 195-207
-
-
Karjoth, G.1
Asokan, N.2
Gülcü, C.3
-
6
-
-
84944880876
-
Secure mobile agent-based merchant brokering in distributed marketplaces
-
D. Kotz and F. Mattern, eds, Berlin Heidelberg: Springer Verlag
-
G. Karjoth, “Secure mobile agent-based merchant brokering in distributed marketplaces,” in Proc. ASA/MA 2000 (D. Kotz and F. Mattern, eds.), vol. 1882 of Lecture Notes in Computer Science, pp. 44–56, Berlin Heidelberg: Springer Verlag, 2000.
-
(2000)
Proc. ASA/MA 2000
, vol.1882
, pp. 44-56
-
-
Karjoth, G.1
-
8
-
-
18944398258
-
Encrypting Java Archives and its application to mobile agent security
-
F. Dignum and C. Sierra, eds, Berlin: Springer Verlag
-
V. Roth and V. Conan, “Encrypting Java Archives and its application to mobile agent security,” in Agent Mediated Electronic Commerce: A European Perspective (F. Dignum and C. Sierra, eds.), vol. 1991 of Lecture Notes in Artifical Intelligence, pp. 232–244, Berlin: Springer Verlag, 2001.
-
(2001)
Agent Mediated Electronic Commerce: A European Perspective
, vol.1991
, pp. 232-244
-
-
Roth, V.1
Conan, V.2
-
9
-
-
84982946701
-
A sanctuary for mobile agents
-
NewYork, NY, USA: Springer-Verlag Inc
-
B. S. Yee, “A sanctuary for mobile agents,” in Secure Internet Programming, vol. 1603 of Lecture Notes in Computer Science, pp. 261–273, NewYork, NY, USA: Springer-Verlag Inc., 1999.
-
(1999)
Secure Internet Programming, Vol. 1603 of Lecture Notes in Computer Science
, vol.2240
, pp. 261-273
-
-
Yee, B.S.1
-
10
-
-
0002584180
-
Security for mobile agents: Issues and requirements
-
October
-
W. M. Farmer, J. D. Guttman, andV. Swarup, “Security for mobile agents: Issues and requirements,” in Proceedings of the National Information Systems Security Conference (NISSC 96), pp. 591–597, October 1996.
-
(1996)
Proceedings of the National Information Systems Security Conference (NISSC 96)
, vol.2240
, pp. 591-597
-
-
Farmer, W.M.1
Guttman, J.D.2
Swarup, V.3
|