透過您的圖書館登入
IP:3.149.230.44

並列摘要


The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and the simplest mechanisms concentrate more on integrity of the code itself and on the detection of unauthorized manipulation. The newer solutions not only secure the compiled program, but also the data, that can be gathered during its journey and even the execution state. Some other approaches base on prevention rather than detection. This paper describes a new idea of securing mobile agents. The presented method protects all: the code, the data and the execution state. The proposal is based on a zero-knowledge proof system and a secure secret sharing scheme, two powerful cryptographic primitives. The paper also includes security analysis of the new method and comparison to currently most widespread solutions.

被引用紀錄


Hsu, P. J. (2014). 由超快速形狀辨識、時間序列分割、時間序列交互相關分析以及擴散理論方法研究蛋白質Transthyretin片斷與金屬叢集的分子動力學模擬 [doctoral dissertation, National Central University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0031-0412201511571563

延伸閱讀