default search action
Search dblp for Publications
export results for "toc:db/conf/mas/mas1998.bht:"
@inproceedings{DBLP:conf/mas/BerkovitsGS98, author = {Shimshon Berkovits and Joshua D. Guttman and Vipin Swarup}, editor = {Giovanni Vigna}, title = {Authentication for Mobile Agents}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {114--136}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_7}, doi = {10.1007/3-540-68671-1\_7}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mas/BerkovitsGS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/Chess98, author = {David M. Chess}, editor = {Giovanni Vigna}, title = {Security Issues in Mobile Code Systems}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {1--14}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_1}, doi = {10.1007/3-540-68671-1\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/Chess98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/GongS98, author = {Li Gong and Roland Schemers}, editor = {Giovanni Vigna}, title = {Signing, Sealing, and Guarding Java Objects}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {206--216}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_11}, doi = {10.1007/3-540-68671-1\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/GongS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/GrayKCR98, author = {Robert S. Gray and David Kotz and George Cybenko and Daniela Rus}, editor = {Giovanni Vigna}, title = {D'Agents: Security in a Multiple-Language, Mobile-Agent System}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {154--187}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_9}, doi = {10.1007/3-540-68671-1\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/GrayKCR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/Hohl98, author = {Fritz Hohl}, editor = {Giovanni Vigna}, title = {Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {92--113}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_6}, doi = {10.1007/3-540-68671-1\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/Hohl98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/KarjothLO98, author = {G{\"{u}}nter Karjoth and Danny B. Lange and Mitsuru Oshima}, editor = {Giovanni Vigna}, title = {A Security Model for Aglets}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {188--205}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_10}, doi = {10.1007/3-540-68671-1\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/KarjothLO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/NeculaL98, author = {George C. Necula and Peter Lee}, editor = {Giovanni Vigna}, title = {Safe, Untrusted Agents Using Proof-Carrying Code}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {61--91}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_5}, doi = {10.1007/3-540-68671-1\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/NeculaL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/OusterhoutLW98, author = {John K. Ousterhout and Jacob Y. Levy and Brent B. Welch}, editor = {Giovanni Vigna}, title = {The Safe-Tcl Security Model}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {217--234}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_12}, doi = {10.1007/3-540-68671-1\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/OusterhoutLW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/PaoliSK98, author = {Flavio De Paoli and Andr{\'{e}} L. M. dos Santos and Richard A. Kemmerer}, editor = {Giovanni Vigna}, title = {Web Browsers and Security}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {235--256}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_13}, doi = {10.1007/3-540-68671-1\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/PaoliSK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/RiordanS98, author = {James Riordan and Bruce Schneier}, editor = {Giovanni Vigna}, title = {Environmental Key Generation Towards Clueless Agents}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {15--24}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_2}, doi = {10.1007/3-540-68671-1\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/RiordanS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/SanderT98, author = {Tomas Sander and Christian F. Tschudin}, editor = {Giovanni Vigna}, title = {Protecting Mobile Agents Against Malicious Hosts}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {44--60}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_4}, doi = {10.1007/3-540-68671-1\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/SanderT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/Vigna98, author = {Giovanni Vigna}, editor = {Giovanni Vigna}, title = {Cryptographic Traces for Mobile Agents}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {137--153}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_8}, doi = {10.1007/3-540-68671-1\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/Vigna98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mas/VolpanoS98, author = {Dennis M. Volpano and Geoffrey Smith}, editor = {Giovanni Vigna}, title = {Language Issues in Mobile Program Security}, booktitle = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, pages = {25--43}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1\_3}, doi = {10.1007/3-540-68671-1\_3}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/VolpanoS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mas/1998, editor = {Giovanni Vigna}, title = {Mobile Agents and Security}, series = {Lecture Notes in Computer Science}, volume = {1419}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68671-1}, doi = {10.1007/3-540-68671-1}, isbn = {3-540-64792-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mas/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.