Mobile Computations and Hostile Hosts
暂无分享,去创建一个
[1] Jean-Jacques Lévy,et al. A Calculus of Mobile Agents , 1996, CONCUR.
[2] James Riely,et al. Type-Safe Execution of Mobile Agents in Anonymous Networks , 1999, Secure Internet Programming.
[3] Luca Cardelli,et al. Mobile Ambients , 1998, FoSSaCS.
[4] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[5] Jan Vitek,et al. Designing JAVASEAL or How to Make JAVA Safe for Agents , 1998 .
[6] Jan Vitek,et al. A Calculus of Secure Mobile Computations ( Preliminary Report ) , 1998 .
[7] Jan Vitek,et al. Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .
[8] W. A. Jansen,et al. MOBILE AGENTS AND SECURITY , 1999 .
[9] Bishal Thapa. Active Networks , 2001, Lecture Notes in Computer Science.
[10] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[11] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[12] Deyu Hu,et al. Design and Evaluation of an Extensible Web & Telephony Server based on the J-Kernel , 1998 .
[13] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[14] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[15] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.