DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, JW | ko |
dc.contributor.author | Hong, SM | ko |
dc.contributor.author | Yoon, Hyunsoo | ko |
dc.date.accessioned | 2013-03-06T13:28:28Z | - |
dc.date.available | 2013-03-06T13:28:28Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2005-09 | - |
dc.identifier.citation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104 | - |
dc.identifier.issn | 0916-8532 | - |
dc.identifier.uri | http://hdl.handle.net/10203/87112 | - |
dc.description.abstract | The mobile agent paradigm is a promising technology to structure distributed applications. Since mobile agents physically move to a remote host that is under the control of a different principal, they need to be protected from this environment which is responsible for execution. In this paper, we provide a new cryptographic methodology of protecting mobile agents from unauthorized modification for the program code by malicious hosts. | - |
dc.language | English | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | Securing mobile agents by integrity-based encryption | - |
dc.type | Article | - |
dc.identifier.wosid | 000232082000011 | - |
dc.identifier.scopusid | 2-s2.0-26444482016 | - |
dc.type.rims | ART | - |
dc.citation.volume | E88D | - |
dc.citation.beginningpage | 2102 | - |
dc.citation.endingpage | 2104 | - |
dc.citation.publicationname | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.contributor.localauthor | Yoon, Hyunsoo | - |
dc.contributor.nonIdAuthor | Lee, JW | - |
dc.contributor.nonIdAuthor | Hong, SM | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
dc.subject.keywordAuthor | integrity-based encryption | - |
dc.subject.keywordAuthor | mobile agent protection | - |
dc.subject.keywordAuthor | malicious host problem | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.