Documents Related by Co-Citation

270 Protecting Mobile Agents Against Malicious Hosts – Tomas Sander, Tomas S, Christian F. Tschudin - 1997
46 Protecting Mobile Agents through Tracing – Giovanni Vigna - 1997
143 Itinerant Agents for Mobile Computing – David Chess , Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik - 1995
69 Environmental Key Generation towards Clueless Agents – James Riordan , Bruce Schneier
69 Towards Fault-tolerant and Secure Agentry – Fred B. Schneider - 1997
65 Protecting the computation results of free-roaming agents – G Karjoth, N Asokan, C Gulcu - 1998
88 Security for mobile agents: issues and requirements – W M Farmer, J D Guttman, V Swarup - 1996
11 editors. Secure Internet Programming: Security Issues for Mobile and Distributed Objects – J Vitek, C Jensen - 1999
89 untrusted agents using proof-carrying code – Safe - 1998
128 A Security Model for Aglets – Gunter Karjoth, Danny Lange, Mitsuru Oshima - 1997
156 Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts – Fritz Hohl - 1998
25 Secure Recording of Itineraries through Co-operating Agents – Volker Roth - 2002
102 Security for Mobile Agents: Authentication and State Appraisal – William M. Farmer, Joshua D. Guttmann, Vipin Swarup - 1996
329 Mobile Agents: Are They a Good Idea? – David Chess, Colin Harrison, Aaron Kershenbaum, T. J. Watson - 1995
159 Agent Tcl: A flexible and secure mobile-agent system – Robert S. Gray - 1996
69 Mobile Agent Security and Telescript – Joseph Tardo, Luis Valente - 1996
22 Mutual Protection of Co-operating Agents – Volker Roth - 1999
154 The Architecture of the Ara Platform for Mobile Agents – Holger Peine, Torsten Stolpmann - 1997
150 Using Secure Coprocessors – Bennet Yee - 1994