建筑师 发表于 2025-3-27 01:00:59

http://reply.papertrans.cn/24/2306/230514/230514_31.png

giggle 发表于 2025-3-27 01:51:05

http://reply.papertrans.cn/24/2306/230514/230514_32.png

苍白 发表于 2025-3-27 08:48:14

An Overview of Security Issues and Techniques in Mobile Agents a human user or an application. In the last several years, mobile agents have found numerous applications including e-commerce. In most applications, the security of mobile agents is of the utmost importance. This paper gives an overview of the main security issues related to the mobile agent parad

motivate 发表于 2025-3-27 09:50:13

http://reply.papertrans.cn/24/2306/230514/230514_34.png

转折点 发表于 2025-3-27 16:10:32

Mobile Trust Negotiationhorization to mobile devices. We examine how the location of trust agents and secure repositories affects such a system. We also present an implementation of one of these models. This protocol leverages software proxies, autonomous trust agents, and secure repositories to allow portable devices from

安定 发表于 2025-3-27 21:45:13

Weak Context Establishment Procedure for Mobility and Multi-Homing Managemente security infrastructure (e.g. a Public-Key Infrastructure). However, building such a global infrastructure has not taken place, maybe because it would be too expensive and difficult to deploy. In this paper, we introduce a security context establishment procedure that utilizes reverse hash chains,

暗讽 发表于 2025-3-28 00:45:35

A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Componentsdocument describes a generic architecture for typical 3-tier web applications. It serves as the basis for analyzing the threats in the most important infrastructural components in that architecture, presented in the following papers.

留恋 发表于 2025-3-28 03:08:48

http://reply.papertrans.cn/24/2306/230514/230514_38.png

Malcontent 发表于 2025-3-28 09:15:24

http://reply.papertrans.cn/24/2306/230514/230514_39.png

ANA 发表于 2025-3-28 10:50:16

http://reply.papertrans.cn/24/2306/230514/230514_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Communications and Multimedia Security; 8th IFIP TC-6 TC-11 David Chadwick,Bart Preneel Conference proceedings 20051st edition IFIP Intern