Secure mobile agents with controlled resources
暂无分享,去创建一个
[1] Hyunsoo Yoon,et al. A New Proxy Signature Scheme Providing Self-delegation , 2006, ICISC.
[2] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[3] Robert H. Deng,et al. Security Analysis of Some Proxy Signatures , 2003, ICISC.
[4] Juhnyoung Lee,et al. Data Engineering Issues in E-Commerce and Services, Second International Workshop, DEECS 2006, San Francisco, CA, USA, June 26, 2006, Proceedings , 2006, DEECS.
[5] Olivier Markowitch,et al. An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.
[6] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[7] Jan Camenisch,et al. Cryptographic security for mobile code , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[8] Guilin Wang,et al. Designated-verifier proxy signatures for e-commerce , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[9] Panayiotis Kotzanikolaou,et al. Secure Transactions with Mobile Agents in Hostile Environments , 2000, ACISP.
[10] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[11] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[12] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[13] Yi Mu,et al. Identity-Based Strong Designated Verifier Signature Schemes , 2004, ACISP.
[14] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[15] Joonsang Baek,et al. Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature , 2001 .
[16] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[17] Fabien Laguillaumie,et al. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.
[18] Michael T. Goodrich,et al. An Efficient Dynamic and Distributed Cryptographic Accumulator , 2002, ISC.
[19] Ron Steinfeld,et al. Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures , 2004, Public Key Cryptography.
[20] Sang-Ho Lee,et al. A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce , 2003, Human.Society@Internet 2003.
[21] Ron Steinfeld,et al. Universal Designated-Verifier Signatures , 2003, ASIACRYPT.
[22] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .