A robust framework for protecting computation results of mobile agents

被引:0
|
作者
Information Security Technique Research Center, Harbin Institute of Technology, Shenzhen Graduate School, China [1 ]
机构
来源
Inf. Technol. J. | 2008年 / 1卷 / 24-31期
关键词
17;
D O I
10.3923/itj.2008.24.31
中图分类号
学科分类号
摘要
引用
收藏
页码:24 / 31
相关论文
共 50 条
  • [1] Protecting the computation results of free-roaming agents
    Karjoth G.
    Asokan N.
    Gülcü C.
    Personal Technologies, 1998, 2 (2) : 92 - 99
  • [2] Protecting the itinerary of mobile agents
    Wilhelm, UG
    Staaman, S
    Buttyán, L
    OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 301 - 301
  • [3] Protecting mobile agent's computation results with reversible watermarking and digital signature
    Khan, Abid
    New, Xiamu
    Yong, Zhang
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 566 - 569
  • [4] A new mechanism for protecting mobile agents
    Zhong, ZF
    Zhu, FX
    ACTIVE MEDIA TECHNOLOGY, 2003, : 231 - 237
  • [5] Protecting mobile agents by using traceability techniques
    Esparza, O
    Fernandez, M
    Soriano, M
    ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, : 264 - 268
  • [6] A hybrid method for protecting the integrity of mobile agents
    Yarahmadi, H.
    Dehghan, M.
    NEW ASPECTS OF TELECOMMUNICATIONS AND INFORMATICS, 2008, : 173 - 176
  • [7] A Framework for Protecting Privacy on Mobile Social Networks
    Seyyed Mohammad Safi
    Ali Movaghar
    Komeil Safikhani Mahmoodzadeh
    Mobile Networks and Applications, 2021, 26 : 1281 - 1299
  • [8] A Framework for Protecting Privacy on Mobile Social Networks
    Safi, Seyyed Mohammad
    Movaghar, Ali
    Safikhani Mahmoodzadeh, Komeil
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (03): : 1281 - 1299
  • [9] Gnafuy: a framework for ubiquitous mobile computation
    Chen, Jin-Jie
    Yu, Fang
    PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 810 - 813
  • [10] Protecting mobile agents from external replay attacks
    Garrigues, Carles
    Migas, Nikos
    Buchanan, William
    Robles, Sergi
    Borrell, Joan
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (02) : 197 - 206