Securing Mobile Agents by Integrity-Based Encryption(<Special Section>Software Agent and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
The mobile agent paradigm is a promising technology to structure distributed applications. Since mobile agents physically move to a remote host that is under the control of a different principal, they need to be protected from this environment which is responsible for execution. In this paper, we provide a new cryptographic methodology of protecting mobile agents from unauthorized modification for the program code by malicious hosts.
- 社団法人電子情報通信学会の論文
- 2005-09-01
著者
-
Lee Jaewon
Korea Advanced Institute Of Science And Technology (kaist)
-
Yoon Hyunsoo
Korea Advanced Inst. Of Sci. And Technol. (kaist) Kor
-
Yoon Hyunsoo
Korea Advanced Institute Of Science And Technology (kaist)
-
HONG Seong-Min
Korea Advanced Institute of Science and Technology (KAIST)
-
Yoon Hyunsoo
Eecs Department At Kaist
関連論文
- VAMSD : Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage
- A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems
- Improving Handover Quality in 4G Mobile Systems
- Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
- A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates(Fundamental Theories for Communications)
- Reactive Key Management Scheme for Access Control in Group Communications(Fundamental Theories for Communications)
- Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment(Application Information Security)
- Handoff Procedure for Seamless Service in IP and OFDM Based 4G Mobile Systems(Mobile Communication, Wireless Technologies and Computational Electromagnetics)
- Securing Mobile Agents by Integrity-Based Encryption(Software Agent and Its Applications)
- Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning(Network, Ubiquitous Networks)
- A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks
- A New MAC Protocol for Improving the End-to-End Performance in Multi-Hop Wireless Ad Hoc Networks(Ad Hoc Network)(Networking Technologies for Mobile Internet Systems)
- Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks