Universally Composable Secure Mobile Agent Computation
暂无分享,去创建一个
[1] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[2] Jan Camenisch,et al. Cryptographic security for mobile code , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[3] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[4] Donald Beaver,et al. Correlated pseudorandomness and the complexity of private computations , 1996, STOC '96.
[5] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[6] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[7] V. Rich. Personal communication , 1989, Nature.
[8] Ran Canetti,et al. An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack , 1999, EUROCRYPT.
[9] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[10] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[11] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[12] Joe Kilian,et al. One-Round Secure Computation and Secure Autonomous Mobile Agents , 2000, ICALP.
[13] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[14] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[15] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[16] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[17] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[18] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[19] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[20] Serge Fehr,et al. Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography , 2004, CRYPTO.
[21] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[22] Ke Xu,et al. Mobile Agent Security Through Multi-Agent Cryptographic Protocols , 2003, International Conference on Internet Computing.
[23] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[24] Hugo Krawczyk,et al. Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.
[25] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .