The Protection Methods for Mobile Code Based on Homomorphic Encryption and Data Confusion
暂无分享,去创建一个
[1] Liang Chen,et al. Public Key Homomorphism Based on Modified ElGamal in Real Domain , 2008, 2008 International Conference on Computer Science and Software Engineering.
[2] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[3] Jim Alves-Foss,et al. The use of encrypted functions for mobile agent security , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[4] Clark Thomborson,et al. A PROVABLE SCHEME FOR HOMOMORPHIC OBFUSCATIONS IN SOFTWARE SECURITY , 2005 .
[5] Cheng Xin-meng,et al. A method of homomorphic encryption , 2008, Wuhan University Journal of Natural Sciences.
[6] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[7] Peter Landrock. New PKI Protocols Using Tamper Resistant Hardware , 2008, EuroPKI.
[8] Joos Vandewalle,et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.