메뉴 건너뛰기




Volumn 1603, Issue , 1999, Pages 469-489

Introducing trusted third parties to the mobile agent paradigm

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; INTELLIGENT AGENTS; MOBILE COMMERCE; OBJECT ORIENTED PROGRAMMING;

EID: 84982994321     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48749-2_22     Document Type: Conference Paper
Times cited : (29)

References (28)
  • 2
    • 0025568003 scopus 로고
    • Value exchange systems enabling security and unobservability
    • H. Biirk and A. Pfitzmajin. Value exchange systems enabling security and unobservability. Computers & Security, 9(8):715-721, 1990.
    • (1990) Computers & Security , vol.9 , Issue.8 , pp. 715-721
    • Biirk, H.1    Pfitzmajin, A.2
  • 9
    • 84955594169 scopus 로고    scopus 로고
    • Mobile Object Systems: Towards the Programmable Internet, volume 1222 of Lecture Notes in Computer Science
    • C. G. Harrison, D. M. Chess, and A. Kershenbaum. Mobile agents: Are they a good idea? In Mobile Object Systems: Towards the Programmable Internet, volume 1222 of Lecture Notes in Computer Science, pages 25-47. Springer Verlag, 1997.
    • (1997) Mobile Agents: Are they a Good Idea?
    • Harrison, C.G.1    Chess, D.M.2    Kershenbaum, A.3
  • 10
    • 21844460907 scopus 로고
    • ITU. ITU-T Recommendation X.509: The Directory-Authentication Framework
    • ITU. ITU-T Recommendation X.509: The Directory-Authentication Framework. International Telecommunication Union, 1993.
    • (1993) International Telecommunication Union
  • 14
    • 0041915631 scopus 로고
    • RSA Data Security, Inc
    • RSA Data Security, Inc. PKCS #1: RSA Encryption Standard. RSA Data Security, Inc., November 1993.
    • (1993) PKCS #1: RSA Encryption Standard
  • 15
    • 85030463467 scopus 로고
    • A formal approach to security architectures
    • Brighton, England
    • R. A. Rueppel. A formal approach to security architectures. In EuroCrypt, pages 387-398, Brighton, England, 1991.
    • (1991) Eurocrypt , pp. 387-398
    • Rueppel, R.A.1
  • 20
    • 84982872741 scopus 로고    scopus 로고
    • New York Times. U.S. workers stole data on 11,000, agency says, April 6, 1996
    • New York Times. U.S. workers stole data on 11,000, agency says, April 6, 1996.
  • 25
    • 0030405434 scopus 로고    scopus 로고
    • The non-technical threat to computing systems
    • I. S. Winkler. The non-technical threat to computing systems. Computing Systems, USENIX Association, 9(1):3-14, Winter 1996.
    • (1996) Computing Systems, USENIX Association , vol.9 , Issue.1 , pp. 3-14
    • Winkler, I.S.1
  • 26
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. IEEE Computer, 25(l):39-52, January 1992.
    • (1992) IEEE Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.