Documents Related by Co-Citation

270 Protecting Mobile Agents Against Malicious Hosts – Tomas Sander, Tomas S, Christian F. Tschudin - 1997
46 Protecting Mobile Agents through Tracing – Giovanni Vigna - 1997
144 Itinerant Agents for Mobile Computing – David Chess , Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik - 1995
89 Security for mobile agents: issues and requirements – W M Farmer, J D Guttman, V Swarup - 1996
69 Environmental Key Generation towards Clueless Agents – James Riordan , Bruce Schneier
157 Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts – Fritz Hohl - 1998
69 Towards Fault-tolerant and Secure Agentry – Fred B. Schneider - 1997
89 untrusted agents using proof-carrying code – Safe - 1997
128 A Security Model for Aglets – Gunter Karjoth, Danny Lange, Mitsuru Oshima - 1997
102 Security for Mobile Agents: Authentication and State Appraisal – William M. Farmer, Joshua D. Guttmann, Vipin Swarup - 1996
65 Protecting the computation results of free-roaming agents – G Karjoth, N Asokan, C Gulcu - 1998
11 editors. Secure Internet Programming: Security Issues for Mobile and Distributed Objects – J Vitek, C Jensen - 1999
329 Mobile Agents: Are They a Good Idea? – David Chess, Colin Harrison, Aaron Kershenbaum, T. J. Watson - 1995
160 Agent Tcl: A flexible and secure mobile-agent system – Robert S. Gray - 1996
70 Mobile Agent Security and Telescript – Joseph Tardo, Luis Valente - 1996
155 The Architecture of the Ara Platform for Mobile Agents – Holger Peine, Torsten Stolpmann - 1997
684 Efficient Software-Based Fault Isolation – Robert Wahbe, Steven Lucco, Thomas E. Anderson, Susan L. Graham - 1993
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
62 Security Issues in Mobile Code Systems – David M. Chess - 1998