Study of mobile agent protection based on data obfuscation and time checking

被引:0
|
作者
Wu, Jiehong [1 ]
Chang, Guiran [2 ]
Gao, Fuxiang [3 ]
Yin, Hang [1 ,2 ]
机构
[1] Engineering Training Center, Shenyang Institute of Aeronautical Engineering, Shenyang 110136, China
[2] Computation Center, Northeastern University, Shenyang 110006, China
[3] College of Information Science and Engineering, Northeastern University, Shenyang 110006, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:363 / 369
相关论文
共 50 条
  • [1] The study for protecting mobile agents based on time checking technology
    Wu, Jiehong
    Guo, Xiaochun
    Tian, Cuihua
    Yin, Hang
    Chang, Guiran
    2007 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS, VOLS 1-5, 2007, : 2013 - +
  • [2] Study of MA protection based on Homomorphism Encryption and Time Checking Technology
    Wu, Jiehong
    Zhang, Po
    Wang, Bin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (05): : 51 - 56
  • [3] Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud
    Guang, Sun
    Xiaoping, F.
    Wangdong, J.
    Fenghua, L.
    Yuewei, J.
    IEEE ACCESS, 2019, 7 : 38162 - 38167
  • [4] A scheme for protecting mobile agents based on combining obfuscated data and time checking technology
    Wu, Jiehong
    Chang, Guiran
    Li, Jia
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 221 - 224
  • [5] Research of mobile agent protection based on JavaCard
    Wang, Ru-Chuan
    Sun, Kai-Cui
    Zhang, Deng-Yin
    Yang, Li-Yang
    Jisuanji Xuebao/Chinese Journal of Computers, 2004, 27 (04): : 492 - 499
  • [6] On the use of opaque predicates in mobile agent code obfuscation
    Majumdar, A
    Thomborson, C
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 648 - 649
  • [7] Software Protection on the Go: A Large-Scale Empirical Study on Mobile App Obfuscation
    Wang, Pei
    Bao, Qinkun
    Wang, Li
    Wang, Shuai
    Chen, Zhaofeng
    Wei, Tao
    Wu, Dinghao
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 26 - 36
  • [8] Privacy protection in mobile agent based service domain
    Huda, MN
    Yamada, S
    Kamioka, E
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 482 - 487
  • [9] Data protection in mobile agents; one-time key based approach
    Park, JY
    Lee, DI
    Lee, HH
    5TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2001, : 411 - 418
  • [10] Real-Time Trajectory Privacy Protection Method Based on Path Obfuscation
    Li, Fengyun
    Guo, Hao
    Bi, Yuanguo
    Li, Yining
    Computer Engineering and Applications, 2024, 60 (02) : 288 - 294