Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[BUKU][B] Active bundles for protecting confidentiality of sensitive data throughout their lifecycle
LB Othmane - 2010 - search.proquest.com
Protecting confidentiality of shared sensitive data requires satisfying conflicting needs for
disseminating data and preventing unauthorized data disclosures. We propose a solution …
disseminating data and preventing unauthorized data disclosures. We propose a solution …
Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile agents
V Gunupudi, SR Tate - … Conference on Financial Cryptography and Data …, 2008 - Springer
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols,
including general secure function evaluation (SFE) protocols. However, interaction is a …
including general secure function evaluation (SFE) protocols. However, interaction is a …
Verifiable distributed oblivious transfer and mobile agent security
The mobile agent is a fundamental building block of the mobile computing paradigm. In
mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the …
mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the …
[PDF][PDF] On garbled circuits and constant round secure function evaluation
SR Tate, K Xu - CoPS Lab, University of North Texas, Tech. Rep, 2003 - Citeseer
In this paper, we examine a form of garbled (or encrypted) circuit introduced by Beaver,
Micali, and Rogaway as part of their design of a constant-round secure function evaluation …
Micali, and Rogaway as part of their design of a constant-round secure function evaluation …
SAgent: a security framework for JADE
V Gunupudi, SR Tate - Proceedings of the fifth international joint …, 2006 - dl.acm.org
This paper presents SAgent, a general-purpose mobile agent security framework that is
designed to protect the computations of mobile agent applications in potentially hostile …
designed to protect the computations of mobile agent applications in potentially hostile …
Security in large-scale open distributed multi-agent systems
Designing large-scale distributed multi-agent systems that operate in open environments,
such as the Internet, creates new challenges, especially with respect to security issues …
such as the Internet, creates new challenges, especially with respect to security issues …
Enforcing security in the agentscape middleware
Multi Agent Systems (MAS) provide a useful paradigm for accessing distributed resources in
an autonomic and self-directed manner. Resources, such as web services, are increasingly …
an autonomic and self-directed manner. Resources, such as web services, are increasingly …
[PDF][PDF] Mobile Agent Data Integrity Using Multi-agent Architecture.
JT McDonald, A Yasinsac, WC Thompson III - PDCS, 2004 - soc.usouthal.edu
Protection of agent data state and partial results in mobile agent systems continues to draw
research interest. Current solutions to integrity attacks are geared at detection of malicious …
research interest. Current solutions to integrity attacks are geared at detection of malicious …
[PDF][PDF] Possible Attacks on and Countermeasures for Secure Multi-Agent Computation.
R Endsuleit, A Wagner - Security and Management, 2004 - researchgate.net
Possible Attacks on and Countermeasures for Secure Multi-Agent Computation Page 1
Possible Attacks on and Countermeasures for Secure Multi-Agent Computation Regine …
Possible Attacks on and Countermeasures for Secure Multi-Agent Computation Regine …
[PDF][PDF] Trust in mobile agent systems
JT McDonald, A Yasinsac, W Thompson - Florida State University, Tech …, 2005 - cs.fsu.edu
The protection of mobile agent systems continues to be an active area of research that will
enable future applications to utilize this paradigm of computing. Agent systems and mobile …
enable future applications to utilize this paradigm of computing. Agent systems and mobile …