A pragmatic alternative to undetachable signatures
ACM SIGOPS Operating Systems Review
ACM Transactions on Internet Technology (TOIT)
A Secure Group Solution for Multi-Agent EC System
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
A Secure Agent-Mediated Payment Protocol
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Undetachable Threshold Signatures
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Secure web transaction with anonymous mobile agent over internet
Journal of Computer Science and Technology
A new signature scheme: joint-signature
Proceedings of the 2004 ACM symposium on Applied computing
A secure method for signature delegation to mobile agents
Proceedings of the 2004 ACM symposium on Applied computing
On the security of some proxy blind signature schemes
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
RDS: Remote Distributed Scheme for Protecting Mobile Agents
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
A Secure Mobile Agent System Model Based on Extended Elementary Object System
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Provably secure delegation-by-certification proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A security scheme of electronic commerce for mobile agents uses undetachable digital signatures
InfoSecu '04 Proceedings of the 3rd international conference on Information security
On the security of some proxy blind signature schemes
Journal of Systems and Software
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Autonomous Agents and Multi-Agent Systems
Secure route structures for parallel mobile agents based systems using fast binary dispatch
Mobile Information Systems
A study of securing route structures for mobile agents dispatched in parallel
International Journal of Web Engineering and Technology
A pairing-based authentication scheme for protecting multiple mobile agent hosts
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Employ a mobile agent for making a payment
Mobile Information Systems
Live forensics framework for wireless sensor nodes using sandboxing
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Policy-based authentication for mobile agents
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Hi-index | 0.00 |