Search dblp for Publications

export results for "toc:db/conf/mas/mas1998.bht:"

 download as .bib file

@inproceedings{DBLP:conf/mas/BerkovitsGS98,
  author       = {Shimshon Berkovits and
                  Joshua D. Guttman and
                  Vipin Swarup},
  editor       = {Giovanni Vigna},
  title        = {Authentication for Mobile Agents},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {114--136},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_7},
  doi          = {10.1007/3-540-68671-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/BerkovitsGS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/Chess98,
  author       = {David M. Chess},
  editor       = {Giovanni Vigna},
  title        = {Security Issues in Mobile Code Systems},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_1},
  doi          = {10.1007/3-540-68671-1\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/Chess98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/GongS98,
  author       = {Li Gong and
                  Roland Schemers},
  editor       = {Giovanni Vigna},
  title        = {Signing, Sealing, and Guarding Java Objects},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {206--216},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_11},
  doi          = {10.1007/3-540-68671-1\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/GongS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/GrayKCR98,
  author       = {Robert S. Gray and
                  David Kotz and
                  George Cybenko and
                  Daniela Rus},
  editor       = {Giovanni Vigna},
  title        = {D'Agents: Security in a Multiple-Language, Mobile-Agent System},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {154--187},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_9},
  doi          = {10.1007/3-540-68671-1\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/GrayKCR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/Hohl98,
  author       = {Fritz Hohl},
  editor       = {Giovanni Vigna},
  title        = {Time Limited Blackbox Security: Protecting Mobile Agents From Malicious
                  Hosts},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {92--113},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_6},
  doi          = {10.1007/3-540-68671-1\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/Hohl98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/KarjothLO98,
  author       = {G{\"{u}}nter Karjoth and
                  Danny B. Lange and
                  Mitsuru Oshima},
  editor       = {Giovanni Vigna},
  title        = {A Security Model for Aglets},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {188--205},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_10},
  doi          = {10.1007/3-540-68671-1\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/KarjothLO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/NeculaL98,
  author       = {George C. Necula and
                  Peter Lee},
  editor       = {Giovanni Vigna},
  title        = {Safe, Untrusted Agents Using Proof-Carrying Code},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {61--91},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_5},
  doi          = {10.1007/3-540-68671-1\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/NeculaL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/OusterhoutLW98,
  author       = {John K. Ousterhout and
                  Jacob Y. Levy and
                  Brent B. Welch},
  editor       = {Giovanni Vigna},
  title        = {The Safe-Tcl Security Model},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {217--234},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_12},
  doi          = {10.1007/3-540-68671-1\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/OusterhoutLW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/PaoliSK98,
  author       = {Flavio De Paoli and
                  Andr{\'{e}} L. M. dos Santos and
                  Richard A. Kemmerer},
  editor       = {Giovanni Vigna},
  title        = {Web Browsers and Security},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {235--256},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_13},
  doi          = {10.1007/3-540-68671-1\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/PaoliSK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/RiordanS98,
  author       = {James Riordan and
                  Bruce Schneier},
  editor       = {Giovanni Vigna},
  title        = {Environmental Key Generation Towards Clueless Agents},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {15--24},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_2},
  doi          = {10.1007/3-540-68671-1\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/RiordanS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/SanderT98,
  author       = {Tomas Sander and
                  Christian F. Tschudin},
  editor       = {Giovanni Vigna},
  title        = {Protecting Mobile Agents Against Malicious Hosts},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {44--60},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_4},
  doi          = {10.1007/3-540-68671-1\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/SanderT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/Vigna98,
  author       = {Giovanni Vigna},
  editor       = {Giovanni Vigna},
  title        = {Cryptographic Traces for Mobile Agents},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_8},
  doi          = {10.1007/3-540-68671-1\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/Vigna98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/VolpanoS98,
  author       = {Dennis M. Volpano and
                  Geoffrey Smith},
  editor       = {Giovanni Vigna},
  title        = {Language Issues in Mobile Program Security},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {25--43},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_3},
  doi          = {10.1007/3-540-68671-1\_3},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/VolpanoS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mas/1998,
  editor       = {Giovanni Vigna},
  title        = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1},
  doi          = {10.1007/3-540-68671-1},
  isbn         = {3-540-64792-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}