Approaching Secure Communications in a Message-Oriented Mobile Computing Environment
暂无分享,去创建一个
Ahmed Karmouch | Roger Impey | Zheng Cui | Tom Gray | R. Impey | T. Gray | A. Karmouch | Zheng Cui
[1] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Jan Vitek,et al. Mobile object systems : towards the programmable internet : Second International Workshop, MOS '96, Linz, Austria, July 8-9, 1996 : selected presentations and invited papers , 1997 .
[4] P. Metzger,et al. Network Working Group , 2000 .
[5] Otto Spaniol,et al. Impacts of mobility on telecommunication and data communication networks , 1995, IEEE Wirel. Commun..
[6] Scott Oaks,et al. Java Security , 1998 .
[7] Jan Vitek,et al. Security and Communication in Mobile Object Systems , 1996, Mobile Object Systems.
[8] Jeffrey M. Bradshaw,et al. Software agents , 1997 .
[9] Timothy W. Finin,et al. KQML as an agent communication language , 1994, CIKM '94.
[10] Rolf Oppliger,et al. Authentication systems for secure networks , 1996 .
[11] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[12] Walter Tuchman,et al. IV. `Hellman presents no shortcut solutions to the DES¿ , 1979, IEEE Spectrum.
[13] Robert S. MacGregor,et al. WWW Security: How to Build a Secure World Wide Web Connection , 1996 .
[14] Tim Howes,et al. Lightweight Directory Access Protocol , 1995, RFC.
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .