Sciweavers

219 search results - page 35 / 44
» Countermeasures for mobile agent security
Sort
View
COMPSAC
2006
IEEE
14 years 1 months ago
Agent-Based Offline Electronic Voting
—Many electronic voting systems, classified mainly as homomorphic cryptography based, mix-net based and blind signature based, appear after the eighties when zero knowledge proof...
Mehmet Tahir Sandikkaya, Bülent Örencik
ECR
2006
81views more  ECR 2006»
13 years 7 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 1 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
ISI
2003
Springer
14 years 20 days ago
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
Abstract. In this paper, we report our work on developing and evaluating a prototype system aimed at addressing the information monitoring and sharing challenges in the law enforce...
Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, F...
ENTCS
2007
150views more  ENTCS 2007»
13 years 7 months ago
On the Expressiveness of Mobile Synchronizing Petri Nets
In recent papers we have introduced Mobile Synchronizing Petri Nets, a new model for mobility based on coloured Petri Nets. It allows the description of systems composed of a coll...
Fernando Rosa Velardo, David de Frutos-Escrig, Olg...