Efficient migration access control for mobile agents
暂无分享,去创建一个
[1] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[2] Yuke Wang. Residue-to-binary converters based on new Chinese remainder theorems , 2000 .
[3] Min-Shiang Hwang. Extension of CHW cryptographic key assignment scheme in a hierarchy , 1999 .
[4] Antonio Corradi,et al. Security issues in mobile agent technology , 1999, Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems.
[5] Chu-Hsing Lin,et al. Dynamic key management schemes for access control in a hierarchy , 1997, Comput. Commun..
[6] Min-Shiang Hwang,et al. A Dynamic Key Generation Scheme for Access Control in a Hierarchy , 1999, Nord. J. Comput..
[7] Niklas Borselius. Mobile agent security , 2002 .
[8] D. Ridley,et al. Cape Town, South Africa , 1986, Journal of clinical ultrasound : JCU.
[9] Pattie Maes,et al. Agents that buy and sell , 1999, CACM.
[10] Jean-Sébastien Coron,et al. Index Calculation Attacks on RSA Signature and Encryption , 2006, Des. Codes Cryptogr..
[11] Volker Roth,et al. Access control and key management for mobile agents , 1998, Comput. Graph..
[12] Min-Shiang Hwang. An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies , 2000, Int. J. Comput. Math..
[13] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[14] Timothy K. Shih. Mobile agent evolution computing , 2001, Inf. Sci..
[15] Anand R. Tripathi,et al. A security architecture for mobile agents in Ajanta , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[16] F. Kuo,et al. Cryptographic key assignment scheme for dynamic access control in a user hierarchy , 1999 .
[17] Min-Shiang Hwang,et al. An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy , 1999 .
[18] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[19] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[20] Fritz Hohl. A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.
[21] Yu-Fang Chung,et al. Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm , 2002, Comput. Secur..
[22] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[23] Chin-Chen Chang,et al. A new solution for assigning cryptographic keys to control access in mobile agent environments , 2006, Wirel. Commun. Mob. Comput..
[24] Min-Shiang Hwang. Cryptanalysis of YCN key assignment scheme in a hierarchy , 2000, Inf. Process. Lett..
[25] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[26] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[27] Min-Shiang Hwang,et al. Efficient access control and key management schemes for mobile agents , 2004, Comput. Stand. Interfaces.