The complexity of Boolean functions
The complexity of Boolean functions
Journal of Cryptology
Boolean circuits versus arithmetic circuits
Information and Computation
Rational function decomposition
ISSAC '91 Proceedings of the 1991 international symposium on Symbolic and algebraic computation
Obfuscated C and other mysteries
Obfuscated C and other mysteries
Efficient signature schemes based on birational permutations
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Attacks on the birational permutation signature schemes
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Generation of near-optimal universal Boolean functions
Journal of Computer and System Sciences
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
First international workshop, AOSE 2000 on Agent-oriented software engineering
Secure Internet programming
Mutual protection of co-operating agents
Secure Internet programming
The Implementation of Security Algorithm of Mobile Agent on Roblet
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
A Secure Group Solution for Multi-Agent EC System
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Towards a Secure Agent Platform Based on FIPA
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
SITA: Protecting Internet Trade Agents from Malicious Hosts
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
Mobile Search for a Black Hole in an Anonymous Ring
DISC '01 Proceedings of the 15th International Conference on Distributed Computing
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Encrypting Java Archives and Its Application to Mobile Agent Security
Agent Mediated Electronic Commerce, The European AgentLink Perspective.
A Java Middleware for Guaranteeing Privacy of Distributed Tuple Spaces
FIDJI '01 Revised Papers from the International Workshop on Scientific Engineering for Distributed Java Applications
One-Round Secure Computation and Secure Autonomous Mobile Agents
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Protecting General Flexible Itineraries of Mobile Agents
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
White-Box Cryptography and an AES Implementation
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Secure Mobile Agent Digital Signatures with Proxy Certificates
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Mobile Agent Route Protection through Hash-Based Mechanisms
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Crawlets: Agents for High Performance Web Search Engines
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Dynamic Self-Checking Techniques for Improved Tamper Resistance
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
A Method for Protecting Mobile Agents against Denial of Service Attacks
CIA '02 Proceedings of the 6th International Workshop on Cooperative Information Agents VI
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
A Provably Secure Additive and Multiplicative Privacy Homomorphism
ISC '02 Proceedings of the 5th International Conference on Information Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Undetachable Threshold Signatures
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Hardening Functions for Large Scale Distributed Computations
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Security Requirements for Management Systems Using Mobile Agents
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Intranet Security with Micro-Firewalls and Mobile Agents for Proactive Intrusion Response
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
Monotonicity and Partial Results Protection for Mobile Agents
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Supporting Digital Signatures in Mobile Environments
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
A Secure Mobile Agent System Model Based on Extended Elementary Object System
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Addressing the trust asymmetry problem in grid computing with encrypted computation
LCR '04 Proceedings of the 7th workshop on Workshop on languages, compilers, and run-time support for scalable systems
Enabling access-privacy for random walk based data analysis applications
Data & Knowledge Engineering
Anonymity Architecture for Mobile Agent Systems
HoloMAS '07 Proceedings of the 3rd international conference on Industrial Applications of Holonic and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing
Locating and Repairing Faults in a Network with Mobile Agents
SIROCCO '08 Proceedings of the 15th international colloquium on Structural Information and Communication Complexity
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Algorithms and theory of computation handbook
Constructing secure mobile-agent-based consumer electronic applications
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Policy-based authentication for mobile agents
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Secure communication for electronic business applications in mobile agent networks
Expert Systems with Applications: An International Journal
The MP architecture: towards a secure framework for mobile agents
International Journal of Agent-Oriented Software Engineering
Searching for black-hole faults in a network using multiple agents
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Distributed security algorithms by mobile agents
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
A secure communication framework for mobile agents
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
IH'04 Proceedings of the 6th international conference on Information Hiding
Tamper resistant software by integrity-based encryption
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Towards secure mobile agent based e-cash system
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
A framework for protecting private information through user-trusted-program and its realizability
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A design of the flexible mobile agents based on web
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Searching for high-value rare events with uncheatable grid computing
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Black hole search in asynchronous rings using tokens
CIAC'06 Proceedings of the 6th Italian conference on Algorithms and Complexity
Secure mediation with mobile code
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Securing mobile agents control flow using opaque predicates
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Searching for a black hole in tree networks
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
On the use of opaque predicates in mobile agent code obfuscation
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Hardness and approximation results for black hole search in arbitrary graphs
SIROCCO'05 Proceedings of the 12th international conference on Structural Information and Communication Complexity
Towards better software tamper resistance
ISC'05 Proceedings of the 8th international conference on Information Security
A secure protocol for mobile agents in hostile environment
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Approximation bounds for black hole search problems
OPODIS'05 Proceedings of the 9th international conference on Principles of Distributed Systems
Hybrid approach for secure mobile agent computations
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Adaptive access control in coordination-based mobile agent systems
Software Engineering for Multi-Agent Systems III
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
Black hole search in directed graphs
SIROCCO'09 Proceedings of the 16th international conference on Structural Information and Communication Complexity
Secure remote execution of sequential computations
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Periodic data retrieval problem in rings containing a malicious host
SIROCCO'10 Proceedings of the 17th international conference on Structural Information and Communication Complexity
Higher dependability and security for mobile applications
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Software-Based copy protection for temporal media during dissemination and playback
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Countermeasures for mobile agent security
Computer Communications
Complexity of Searching for a Black Hole
Fundamenta Informaticae
An approach of trusted program generation for user-responsible privacy
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Security Issues in Mobile Agent Applications
International Journal of Agent Technologies and Systems
Self-reliant mobile code: a new direction of agent security
Journal of Network and Computer Applications
Hi-index | 0.00 |
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under execution and (b) the mobile code against tampering attempts by the executing host. Many techniques for the first problem (a) have been developed. The second problem (b) seems to be much harder: It is the general belief that computation privacy for mobile code cannot be provided without tamper resistant hardware. Furthermore it is doubted that an agent can keep a secret (e.g., a secret key to generate digital signatures). There is an error in reasoning in the arguments supporting these beliefs which we are going to point out. In this paper we describe software-only approaches for providing computation privacy for mobile code in the important case that the mobile code fragment computes an algebraic circuit (a polynomial). We further describe an approach how a mobile agent can digitally sign his output securely.