LAVA: secure delegation of mobile applets: design, implementation and applications

被引:0
|
作者
机构
来源
J Eng Appl Sci | / 242-247期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
11
引用
收藏
相关论文
共 50 条
  • [1] LAVA: Secure delegation of mobile applets: Design, implementation and applications
    Hansoty, JN
    Vouk, M
    Wu, SF
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 242 - 247
  • [2] Design and Implementation of a Compiler with Secure Coding Rules for Secure Mobile Applications
    Son, Yunsik
    Oh, Seman
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 201 - 206
  • [3] Design and implementation of the compiler with secure coding rules for developing secure mobile applications in memory usages
    Son, Yun Sik
    Lee, Yang Sun
    Oh, Se Man
    International Journal of Smart Home, 2012, 6 (04): : 153 - 168
  • [4] Design and implementation of a secure mobile IP protocol
    Mufti, M
    Khanum, A
    2004 INTERNATIONAL NETWORKING AND COMMUNICATIONS CONFERENCE, PROCEEDINGS, 2004, : 53 - 57
  • [5] A design and implementation of secure API based on Windows Mobile
    Zhen, Weikun
    Liang, Weizhong
    Liang, Dongying
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5397 - +
  • [6] Design and implementation of a secure and flexible access-right delegation for resource constrained environments
    Rabehaja, Tahiry
    Pal, Shantanu
    Hitchens, Michael
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 : 593 - 608
  • [7] Secure mobile agents applications: Implementation through platform services
    Ametller, J
    Robles, S
    Borrell, J
    MOBILE AGENTS FOR TELECOMMUNICATION APPLICATIONS, PROCEEDINGS, 2003, 2881 : 265 - 274
  • [8] Implementation of a secure USIM COS architecture for mobile payment applications
    Xiao, Juan
    Wu, Juan
    Xu, Donglai
    SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONICS AND INFORMATION ENGINEERING, 2017, 10322
  • [9] Delegation agents: Design and implementation
    Suzuki, M
    Kiriha, Y
    Nakai, S
    INTEGRATED NETWORK MANAGEMENT V: INTEGRATED MANAGEMENT IN A VIRTUAL WORLD, 1997, : 742 - 751
  • [10] Secure Delegation of Isogeny Computations and Cryptographic Applications
    Pedersen, Robi
    Uzunkol, Osmanbey
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 29 - 42