IEEE Transactions on Software Engineering
IEEE Internet Computing
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Non-Interactive CryptoComputing For NC1
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Cryptographic Security for Mobile Code
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Mobile Code Paradigms and Security Issues
IEEE Internet Computing
Energy-efficient distributed authorisation server (DAS) placement for sensor networks
International Journal of High Performance Computing and Networking
Host-Based Security Challenges and Controls: A Survey of Contemporary Research
Information Security Journal: A Global Perspective
Protecting mobile agents from external replay attacks
Journal of Systems and Software
Computational REST meets Erlang
TOOLS'11 Proceedings of the 49th international conference on Objects, models, components, patterns
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
SP 800-28 Version 2. Guidelines on Active Content and Mobile Code
SP 800-28 Version 2. Guidelines on Active Content and Mobile Code
Hi-index | 0.00 |
Mobile code systems could be the next-generation distributed programming paradigm, but that first requires security mechanisms for protecting them against malicious actions by remote hosts.