Securing mobile agents by integrity-based encryption

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 322
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, JWko
dc.contributor.authorHong, SMko
dc.contributor.authorYoon, Hyunsooko
dc.date.accessioned2013-03-06T13:28:28Z-
dc.date.available2013-03-06T13:28:28Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2005-09-
dc.identifier.citationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104-
dc.identifier.issn0916-8532-
dc.identifier.urihttp://hdl.handle.net/10203/87112-
dc.description.abstractThe mobile agent paradigm is a promising technology to structure distributed applications. Since mobile agents physically move to a remote host that is under the control of a different principal, they need to be protected from this environment which is responsible for execution. In this paper, we provide a new cryptographic methodology of protecting mobile agents from unauthorized modification for the program code by malicious hosts.-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleSecuring mobile agents by integrity-based encryption-
dc.typeArticle-
dc.identifier.wosid000232082000011-
dc.identifier.scopusid2-s2.0-26444482016-
dc.type.rimsART-
dc.citation.volumeE88D-
dc.citation.beginningpage2102-
dc.citation.endingpage2104-
dc.citation.publicationnameIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.contributor.localauthorYoon, Hyunsoo-
dc.contributor.nonIdAuthorLee, JW-
dc.contributor.nonIdAuthorHong, SM-
dc.type.journalArticleArticle; Proceedings Paper-
dc.subject.keywordAuthorintegrity-based encryption-
dc.subject.keywordAuthormobile agent protection-
dc.subject.keywordAuthormalicious host problem-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0