Toward a security architecture for smart messages: challenges, solutions, and open issues
暂无分享,去创建一个
Liviu Iftode | Gang Xu | Cristian Borcea | L. Iftode | C. Borcea | Gang Xu
[1] Anand R. Tripathi,et al. Agent Server Architecture for the Ajanta Mobile-Agent System , 1998 .
[2] Charles Adams,et al. Understanding Public-Key Infra-structure: Concepts, Standards, and Deployment Con-siderations , 1999 .
[3] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[4] A.S. Tanenbaum,et al. Security in a mobile agent system , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.
[5] George Cybenko,et al. Mobile Agents: Motivations and State-of-the-Art Systems , 2000 .
[6] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[7] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[8] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[9] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[10] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[11] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[12] T. Aura,et al. Robust Membership Management for Ad-hoc Groups , 2000 .
[13] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[14] Gruia-Catalin Roman,et al. Consistent group membership in ad hoc networks , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[15] Liviu Iftode,et al. Self-routing in pervasive computing environments using smart messages , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[16] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[17] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.
[18] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[19] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[20] Anand R. Tripathi,et al. Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..
[21] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[22] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[23] Liviu Iftode,et al. Cooperative computing for distributed embedded systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[24] Dejan S. Milojicic,et al. Mobile Objects and Agents (MOA) , 1998, Distributed Syst. Eng..