A communication security protocol of mobile agent system
暂无分享,去创建一个
Huanguo Zhang | Jingwei Zhang | Huanmei Guan | Xuejun Meng | Huanmei Guan | Huanguo Zhang | Xuejun Meng | Jingwei Zhang
[1] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[2] Cynthia Dwork,et al. Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.
[3] Liu Wei-feng. Research of Mobile Agent-based Security in the E-commerce , 2004 .
[4] Cao Li-ming. Security Scheme of Electronic Transactions for Mobile Agents , 2004 .
[5] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2006 .
[6] Gu Yu,et al. A Survey of Security Research in Mobile Agent Systems , 2003 .
[7] Zhenfu Cao,et al. Survey of information security , 2007, Science in China Series F: Information Sciences.
[8] Alfred Menezes,et al. Topics in Cryptology – CT-RSA 2005 , 2005 .
[9] Paulo S. L. M. Barreto,et al. A New Two-Party Identity-Based Authenticated Key Agreement , 2005, CT-RSA.
[10] Giovanni Vigna. Mobile agents: ten reasons for failure , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[11] William Stallings,et al. Cryptography and network security , 1998 .