A taxonomy for attacks on mobile agent
暂无分享,去创建一个
[1] Xun Yi,et al. A Secure Intelligent Trade Agent System , 1998, Trends in Distributed Systems for Electronic Commerce.
[2] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[3] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[4] Stefan Fünfrocken. Protecting Mobile Web-Commerce Agents with Smartcards , 1999, ASA/MA.
[5] Jacobus E. van der Merwe,et al. Electronic commerce with secure intelligent trade agent , 1997, ICICS.
[6] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[7] Fritz Hohl. A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.
[8] Fritz Hohl,et al. A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[9] Panayiotis Kotzanikolaou,et al. Secure Transactions with Mobile Agents in Hostile Environments , 2000, ACISP.
[10] Moti Yung,et al. Sliding Encryption: A Cryptographic Tool for Mobile Agents , 1997, FSE.
[11] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[12] Sebastiaan H. von Solms,et al. Refereed paper: Electronic commerce with secure intelligent trade agents , 1998 .