1 |
N. Borselius, C. J. Mitchell, and A. Wilson, 'On the Value of Threshold Signature,' in Proceeding ACM SIGOPS Operating Systems Review, Vol. 34, No. 4, pp.30-35, 2002
DOI
|
2 |
H. K. Tan and L. Moreau, 'Certificates for Mobile Code Security,' in Proceedings of the 17th ACM Symposium on Applied Computing, March 2002
|
3 |
V. Shoup, 'Practical threshold signa- tures,' In B. Preneel(Ed.), Advances in Cryptology EUROCRYPT 2000, LNCS 1807, pp.207-220. Springer-Verlag, 2000
|
4 |
P. Kotzanikolaou, M. Burmester, and V. Chrissikpoulos, 'Secure Transactions with Mobile Agents in Hostile Environments,' in E. Dawson et al. (Ed.s), Information Security and Privacy, in Proceedings of the 5th Australasian Conference ACISP 2000, LNCS 1841, pp.289-297, Springer-verlag, 2000
|
5 |
T. Sander, and C. Tschudin, 'Protecting Mobile Agents Against Malicious Hosts,' in G. Vigna(Ed.), Mobile Agents and Security, LNCS1419, pp.44-60, Springer-verlag, 1998
|
6 |
C. R. Jung, 'A Framework of Agent Protection Protocol for Secure Execution of Mobile Agent,' in Journal of KIMICS, Vol. 8, No. 2, pp. 371-378, 2004
과학기술학회마을
|
7 |
H. K. Tan, and L. Moreau, 'Extending Execution Tracing for Mobile Code Security,' K. Fischer, D. Hutter(Eds), in Proceeding of the 2nd International Workshop on Security in Mobile Multi-Agent Systems(SEMAS'2002), DFKI Research Report(RR-02-03), pp.51-59, 2002
|
8 |
박종열, 이동익, 이형효, 박중길, '이동 에이전트의 데이터 보호를 위한 일회용 에이전트 키생성 시스템', 한국정보과학회논문지:정보통신 제28권, 제3호, pp.309-320, 2001
|
9 |
N. M. Karnik, A. R. Tripathi, 'Security in the Ajanta Mobile Agent System,' Technical Report TR-5-99, University of Minnesota, Minneapolis, MN 55455, U.S.A., May, 1999
|