Hierarchical Time-Bound Key Management for Mobile Agents
暂无分享,去创建一个
[1] G. Aydin,et al. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY , 2006 .
[2] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[3] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[4] Min-Shiang Hwang,et al. Efficient access control and key management schemes for mobile agents , 2004, Comput. Stand. Interfaces.
[5] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[6] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[7] Elisa Bertino,et al. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting , 2008, IEEE Transactions on Dependable and Secure Computing.
[8] Ahmed Karmouch,et al. Mobile software agents: an overview , 1998, IEEE Commun. Mag..
[9] Volker Roth,et al. Access control and key management for mobile agents , 1998, Comput. Graph..
[10] Yu-Fang Chung,et al. Efficient migration for mobile computing in distributed networks , 2009, Comput. Stand. Interfaces.
[11] Hung-Yu Chen,et al. Efficient time-bound hierarchical key assignment scheme , 2004 .
[12] Fritz Hohl. A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.
[13] E. Rabinovitch,et al. The language Of The Internet , 1998, IEEE Communications Magazine.