Sciweavers

219 search results - page 5 / 44
» Countermeasures for mobile agent security
Sort
View
82
Voted
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
15 years 3 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
95
Voted
MA
1999
Springer
133views Communications» more  MA 1999»
15 years 2 months ago
Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce
Although mobile agents are a promising technology, the large-scale deployment of agents and the existence of hosts running agencies will not happen until proper security mechanism...
Paulo Marques, Luís Moura Silva, Joã...
97
Voted
MA
2001
Springer
175views Communications» more  MA 2001»
15 years 2 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....