A Sanctuary for Mobile Agents
暂无分享,去创建一个
[1] Martín Abadi,et al. On hiding information from an oracle , 1987, J. Comput. Syst. Sci..
[2] Robbert van Renesse,et al. Cryptographic support for fault-tolerant distributed computing , 1996, EW 7.
[3] Joe Kilian,et al. A note on efficient zero-knowledge proofs and arguments (extended abstract) , 1992, STOC '92.
[4] R. Jueneman,et al. Message authentication , 1985, IEEE Communications Magazine.
[5] John Black,et al. Message authentication codes , 2000 .
[6] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[7] George C. Necula,et al. Safe kernel extensions without run-time checking , 1996, OSDI '96.
[8] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[9] Silvio Micali,et al. CS proofs , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[10] Scott Oaks,et al. Java Security , 1998 .
[11] Steven McCanne,et al. The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.
[12] Xiangmin Zhang,et al. Java Security , 2000 .
[13] Michael J. Kelly,et al. Common Cryptographic Architecture Cryptographic Application Programming Interface , 1991, IBM Syst. J..
[14] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[15] Ivan Damgård,et al. Linear zero-knowledge—a note on efficient zero-knowledge proofs and arguments , 1997, STOC '97.
[16] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[17] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[18] T. Anderson,et al. Eecient Software-based Fault Isolation , 1993 .
[19] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[20] Brian N. Bershad,et al. Extensibility safety and performance in the SPIN operating system , 1995, SOSP.
[21] Levente Buttyán,et al. Introducing Trusted Third Parties to the Mobile Agent Paradigm , 2001, Secure Internet Programming.
[22] Leonid A. Levin,et al. Checking computations in polylogarithmic time , 1991, STOC '91.
[23] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[24] Joel H. Saltz,et al. Network-aware mobile programs , 1997 .
[25] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[26] E AndersonThomas,et al. Efficient software-based fault isolation , 1993 .
[27] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.