LAVA: secure delegation of mobile applets: design, implementation and applications

被引:0
|
作者
机构
来源
J Eng Appl Sci | / 242-247期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
11
引用
收藏
相关论文
共 50 条
  • [31] Design and implementation of a wireless remote data acquisition system for mobile applications
    Vilela, JPT
    Valenzuela, JCM
    5th International Workshop on Design of Reliable Communication Networks, Proceedings: RELIABLE NETWORKS FOR RELIABLE SERVICES, 2005, : 503 - 510
  • [32] Design, implementation, and experimentation on mobile agent security for electronic commerce applications
    Chan, AHW
    Wong, CKM
    Wong, TY
    Lyu, MR
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 1871 - 1877
  • [33] Secure grid-based mobile agent platform by instance-oriented delegation
    Ma, TC
    Li, SP
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 916 - 923
  • [34] Design and Implementation of Secure and Transferable eCoupons
    Khan, M. Fahim Ferdous
    Sakamura, Ken
    2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 559 - 561
  • [35] Design and Implementation of the Ascend Secure Processor
    Ren, Ling
    Fletcher, Christopher W.
    Kwon, Albert
    van Dijk, Marten
    Devadas, Srinivas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (02) : 204 - 216
  • [36] The design and implementation of a secure auction service
    Franklin, MK
    Reiter, MK
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (05) : 302 - 312
  • [37] DESIGN AND IMPLEMENTATION OF A SECURE MODBUS PROTOCOL
    Fovino, Igor Nai
    Carcano, Andrea
    Masera, Marcelo
    Trombetta, Alberto
    CRITICAL INFRASTRUCTURE PROTECTION III, 2009, 311 : 83 - 96
  • [38] Secure Internet phone - Design and implementation
    Horster, P
    Schaffer, M
    Schartner, P
    Sommer, D
    COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 313 - 324
  • [39] The Design and Implementation of Secure Socket SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    TRANSACTIONS ON COMPUTATIONAL SCIENCE VI, 2009, 5730 : 180 - +
  • [40] New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis
    Gnatyuk, Sergiy
    Akhmetov, Berik
    Kozlovskyi, Valeriy
    Kinzeryavyy, Vasyl
    Aleksander, Marek
    Prysiazhnyi, Dmytro
    ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION III, 2020, 1126 : 93 - 104