Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature
暂无分享,去创建一个
Joonsang Baek | Byoungcheon Lee | Kwangjo Kim | Heesun Kim | J. Baek | Kwangjo Kim | Byoungcheon Lee | Heesun Kim
[1] Xun Yi,et al. A Secure Intelligent Trade Agent System , 1998, Trends in Distributed Systems for Electronic Commerce.
[2] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[3] Panayiotis Kotzanikolaou,et al. Secure Transactions with Mobile Agents in Hostile Environments , 2000, ACISP.
[4] Sergio Loureiro,et al. Privacy for mobile code , 1999 .
[5] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[6] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[7] P. KOTZANIKOLAOU. Mobile Agents for Secure Electronic Transactions , .
[8] Jacques Stern,et al. Attacks on the Birational Permutation Signature Schemes , 1993, CRYPTO.
[9] Jacobus E. van der Merwe,et al. Electronic commerce with secure intelligent trade agent , 1997, ICICS.
[10] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[11] Eugène van Heyst,et al. How to Make Efficient Fail-stop Signatures , 1992, EUROCRYPT.
[12] Sebastiaan H. von Solms,et al. Refereed paper: Electronic commerce with secure intelligent trade agents , 1998 .