Secure Mobile Agent Using Strong Non-designated Proxy Signature
暂无分享,去创建一个
[1] Jacobus E. van der Merwe,et al. Electronic commerce with secure intelligent trade agent , 1997, ICICS.
[2] P. KOTZANIKOLAOU. Mobile Agents for Secure Electronic Transactions , .
[3] Sebastiaan H. von Solms,et al. Refereed paper: Electronic commerce with secure intelligent trade agents , 1998 .
[4] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[5] Sergio Loureiro,et al. Privacy for mobile code , 1999 .
[6] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[7] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[8] Panayiotis Kotzanikolaou,et al. Secure Transactions with Mobile Agents in Hostile Environments , 2000, ACISP.
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[11] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[12] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[13] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[14] Joonsang Baek,et al. Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature , 2001 .
[15] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[16] Wayne A. Jansen,et al. Mobile Agent Security , 1999 .