Sciweavers

ISCAPDCS
2004
14 years 27 days ago
Semantic Encryption Transformation Scheme
We present a scheme to protect mobile code from malicious hosts. We propose a transformation scheme that changes the semantics of a program using pseudorandom I/O scrambling, cond...
Willard Thompson, Alec Yasinsac, J. Todd McDonald
EUMAS
2006
14 years 28 days ago
Towards Payment Systems for Mobile Agents
Future areas of application for mobile agents technology are open, distributed and decentralized networks, where Mobile Agents autonomously perform tasks on behalf of their princi...
Christian Anhalt, Stefan Kirn
MA
1999
Springer
133views Communications» more  MA 1999»
14 years 3 months ago
Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce
Although mobile agents are a promising technology, the large-scale deployment of agents and the existence of hosts running agencies will not happen until proper security mechanism...
Paulo Marques, Luís Moura Silva, Joã...
DEXAW
2002
IEEE
97views Database» more  DEXAW 2002»
14 years 4 months ago
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
Yan Wang 0002, Kian-Lee Tan, Xiaolin Pang
ICMCS
2006
IEEE
138views Multimedia» more  ICMCS 2006»
14 years 5 months ago
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming
Current peer-to-peer (P2P) streaming systems often assume that hosts are cooperative. However, this may not be true in the open environment of the Internet. In this paper, we disc...
Xing Jin, S.-H. Gary Chan, Wai-Pun Ken Yiu, Yongqi...