The SCEAS System
Navigation Menu

Conferences in DBLP

Mobile Agents and Security (mas)
1998 (conf/mas/1998)

  1. David M. Chess
    Security Issues in Mobile Code Systems. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:1-14 [Conf]
  2. James Riordan, Bruce Schneier
    Environmental Key Generation Towards Clueless Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:15-24 [Conf]
  3. Dennis M. Volpano, Geoffrey Smith
    Language Issues in Mobile Program Security. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:25-43 [Conf]
  4. Tomas Sander, Christian F. Tschudin
    Protecting Mobile Agents Against Malicious Hosts. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:44-60 [Conf]
  5. George C. Necula, Peter Lee
    Safe, Untrusted Agents Using Proof-Carrying Code. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:61-91 [Conf]
  6. Fritz Hohl
    Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:92-113 [Conf]
  7. Shimshon Berkovits, Joshua D. Guttman, Vipin Swarup
    Authentication for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:114-136 [Conf]
  8. Giovanni Vigna
    Cryptographic Traces for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:137-153 [Conf]
  9. Robert S. Gray, David Kotz, George Cybenko, Daniela Rus
    D'Agents: Security in a Multiple-Language, Mobile-Agent System. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:154-187 [Conf]
  10. Günter Karjoth, Danny B. Lange, Mitsuru Oshima
    A Security Model for Aglets. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:188-205 [Conf]
  11. Li Gong, Roland Schemers
    Signing, Sealing, and Guarding Java Objects. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:206-216 [Conf]
  12. John K. Ousterhout, Jacob Y. Levy, Brent B. Welch
    The Safe-Tcl Security Model. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:217-234 [Conf]
  13. Flavio De Paoli, André L. M. dos Santos, Richard A. Kemmerer
    Web Browsers and Security. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:235-256 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002