A secure mobile agent protocol for vehicular communication systems
暂无分享,去创建一个
Mahmoud Al-Qutayri | Chan Yeob Yeun | Dina Shehada | M. Jamal Zemerly | Yousof Al Hammadi | C. Yeun | M. Al-Qutayri | D. Shehada | M. Zemerly | Yousof Al Hammadi
[1] Xu Huang,et al. E-health Services with Secure Mobile Agent , 2009, 2009 Seventh Annual Communication Networks and Services Research Conference.
[2] Rafal Leszczyna,et al. Anonymity Architecture for Mobile Agent Systems , 2007, HoloMAS.
[3] Ig Ibert Bittencourt,et al. A survey of security in multi-agent systems , 2012, Expert Syst. Appl..
[4] Zubair A. Baig. Multi-agent systems for protecting critical infrastructures: A survey , 2012, J. Netw. Comput. Appl..
[5] M. E. Correia,et al. A literature review of security mechanisms employed by mobile agents , 2012, 7th Iberian Conference on Information Systems and Technologies (CISTI 2012).
[6] Dharmendra Sharma,et al. 2011 International Conference on Electrical Engineering and Informatics 17-19 July 2011 , Bandung , Indonesia Enhancing Security in E-health Services using Agent , 2011 .
[7] Habiba Drias,et al. Towards a Security Solution for Mobile Agents , 2013, WorldCIST.
[8] Amirreza Masoumzadeh,et al. A survey of security issue in multi-agent systems , 2011, Artificial Intelligence Review.
[9] Mahmoud Al-Qutayri,et al. Security and Privacy of Intelligent VANETs , 2010 .
[10] Jong Hyuk Park,et al. A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication , 2011, Int. J. Commun. Syst..
[11] Pascal Lafourcade,et al. Key Management Protocol in WIMAX Revisited , 2012 .
[12] Behrouz Tork Ladani,et al. Anonymity and security for autonomous mobile agents , 2010, IET Inf. Secur..
[13] Mohamed Jamal Zemerly,et al. A new lightweight hybrid cryptographic algorithm for the internet of things , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[14] Wen-Chung Kuo,et al. An efficient and secure anonymous mobility network authentication scheme , 2014, J. Inf. Secur. Appl..
[15] Chan Yeob Yeun,et al. Recent Advances in VANET Security: A Survey , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).
[16] Ping Chen,et al. Mobile Agents Integrity Research , 2007, I3E.
[17] Jong Hyuk Park,et al. Secure and efficient public key management in next generation mobile networks , 2011, Personal and Ubiquitous Computing.
[18] Jose M. Alcaraz Calero,et al. Distributed security for multi-agent systems - review and applications , 2010, IET Inf. Secur..
[19] L. Futcher,et al. IFIP – The International Federation for Information Processing , 2004 .
[20] G. Geetha,et al. Implementation of Trust and Reputation Management for Free-Roaming Mobile Agent Security , 2015, IEEE Systems Journal.
[21] Chris J. Mitchell,et al. Supporting User Privacy in Location Based Services , 2005, IEICE Trans. Commun..
[22] Gora Chand Nandi,et al. Self-reliant mobile code: a new direction of agent security , 2014, J. Netw. Comput. Appl..
[23] Wilmuth Müller,et al. Evaluating the security of mobile agent platforms , 2009, Autonomous Agents and Multi-Agent Systems.
[24] G. Geetha,et al. Data Security in Free Roaming Mobile Agents , 2011 .
[25] Qutaibah M. Malluhi,et al. Advances in Intelligent Systems and Computing , 2015 .
[26] Mohammed Badrul Hasan,et al. A review of security implications and possible solutions for mobile agents in e-commerce , 2009, 2009 Innovative Technologies in Intelligent Systems and Industrial Applications.
[27] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.
[28] Carles Garrigues,et al. Protecting mobile agents from external replay attacks , 2009, J. Syst. Softw..
[29] Cas J. F. Cremers,et al. Operational Semantics and Verification of Security Protocols , 2012, Information Security and Cryptography.
[30] Mohamed Jamal Zemerly,et al. Formal modeling and verification of DLK protocol , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[31] Charalampos Konstantopoulos,et al. Mobile recommender systems in tourism , 2014, J. Netw. Comput. Appl..