Detecting and Proving Manipulation Attacks in Mobile Agent Systems
暂无分享,去创建一个
Jose L. Muñoz | Jordi Forné | Oscar Esparza | Miguel Soriano | O. Esparza | J. L. Muñoz | J. Forné | M. Soriano
[1] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[2] Robbert van Renesse,et al. Cryptographic support for fault-tolerant distributed computing , 1996, EW 7.
[3] Wenfei Fan,et al. Keys with Upward Wildcards for XML , 2001, DEXA.
[4] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[5] Joan Borrell,et al. Protecting Mobile Agent Itineraries , 2003, MATA.
[6] Jose L. Muñoz,et al. Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts , 2003, ICWE.
[7] Volker Roth,et al. Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.
[8] San Murugesan. Web engineering , 1999, LINK.
[9] Jose L. Muñoz,et al. Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts , 2003, MATA.
[10] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[11] Jose L. Muñoz,et al. Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts , 2003, DEXA.
[12] Jan Vitek,et al. Secure Internet Programming , 1999 .
[13] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[14] E. Horlait. Mobile Agents for Telecommunication Applications , 2003, Lecture Notes in Computer Science.
[15] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[16] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[17] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .