建筑师
发表于 2025-3-27 01:00:59
http://reply.papertrans.cn/24/2306/230514/230514_31.png
giggle
发表于 2025-3-27 01:51:05
http://reply.papertrans.cn/24/2306/230514/230514_32.png
苍白
发表于 2025-3-27 08:48:14
An Overview of Security Issues and Techniques in Mobile Agents a human user or an application. In the last several years, mobile agents have found numerous applications including e-commerce. In most applications, the security of mobile agents is of the utmost importance. This paper gives an overview of the main security issues related to the mobile agent parad
motivate
发表于 2025-3-27 09:50:13
http://reply.papertrans.cn/24/2306/230514/230514_34.png
转折点
发表于 2025-3-27 16:10:32
Mobile Trust Negotiationhorization to mobile devices. We examine how the location of trust agents and secure repositories affects such a system. We also present an implementation of one of these models. This protocol leverages software proxies, autonomous trust agents, and secure repositories to allow portable devices from
安定
发表于 2025-3-27 21:45:13
Weak Context Establishment Procedure for Mobility and Multi-Homing Managemente security infrastructure (e.g. a Public-Key Infrastructure). However, building such a global infrastructure has not taken place, maybe because it would be too expensive and difficult to deploy. In this paper, we introduce a security context establishment procedure that utilizes reverse hash chains,
暗讽
发表于 2025-3-28 00:45:35
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Componentsdocument describes a generic architecture for typical 3-tier web applications. It serves as the basis for analyzing the threats in the most important infrastructural components in that architecture, presented in the following papers.
留恋
发表于 2025-3-28 03:08:48
http://reply.papertrans.cn/24/2306/230514/230514_38.png
Malcontent
发表于 2025-3-28 09:15:24
http://reply.papertrans.cn/24/2306/230514/230514_39.png
ANA
发表于 2025-3-28 10:50:16
http://reply.papertrans.cn/24/2306/230514/230514_40.png