Efficient key management scheme for hierarchical access control in mobile agents
暂无分享,去创建一个
[1] Min-Shiang Hwang,et al. Efficient access control and key management schemes for mobile agents , 2004, Comput. Stand. Interfaces.
[2] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[3] Athanasios T. Karygiannis,et al. SP 800-19. Mobile Agent Security , 1999 .
[4] Volker Roth,et al. Access control and key management for mobile agents , 1998, Comput. Graph..
[5] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[6] Joos Vandewalle,et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.
[7] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[8] Timothy K. Shih. Mobile agent evolution computing , 2001, Inf. Sci..
[9] B. C. Brookes,et al. Information Sciences , 2020, Cognitive Skills You Need for the 21st Century.
[10] Steven Walczak,et al. Auction Advisor: an agent-based online-auction decision support system , 2006, Decis. Support Syst..
[11] Wayne Jansen,et al. NIST Special Publication 800-19 – Mobile Agent Security , 2000 .
[12] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[13] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[14] Ahmed Karmouch. Mobile Software Agents for Telecommunications , 1998, IEEE Communications Magazine.
[15] Mazliza Othman,et al. Secure and auditable agent-based e-marketplace framework for mobile users , 2008, Comput. Stand. Interfaces.