LAVA: secure delegation of mobile applets: design, implementation and applications

被引:0
作者
机构
来源
J Eng Appl Sci | / 242-247期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
11
引用
收藏
相关论文
共 50 条
  • [31] Design and Implementation of an Automated Mobile Applications Generator for Remote Database Access
    Vazquez-Briseno, M.
    Vincent, P.
    Nieto-Hipolito, J. I.
    Sanchez-Lopez, J. D.
    IEEE LATIN AMERICA TRANSACTIONS, 2011, 9 (03) : 346 - 352
  • [32] Design and implementation of the Pervaho middleware for mobile context-aware applications
    Eugster, Patrick
    Garbinato, Benoit
    Holzer, Adrian
    2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 125 - +
  • [33] Secure grid-based mobile agent platform by instance-oriented delegation
    Ma, TC
    Li, SP
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 916 - 923
  • [34] Design and Implementation of Secure and Transferable eCoupons
    Khan, M. Fahim Ferdous
    Sakamura, Ken
    2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 559 - 561
  • [35] The Design and Implementation of Secure Socket SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    TRANSACTIONS ON COMPUTATIONAL SCIENCE VI, 2009, 5730 : 180 - +
  • [36] DESIGN AND IMPLEMENTATION OF A SECURE MODBUS PROTOCOL
    Fovino, Igor Nai
    Carcano, Andrea
    Masera, Marcelo
    Trombetta, Alberto
    CRITICAL INFRASTRUCTURE PROTECTION III, 2009, 311 : 83 - 96
  • [37] Secure Internet phone - Design and implementation
    Horster, P
    Schaffer, M
    Schartner, P
    Sommer, D
    COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 313 - 324
  • [38] New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis
    Gnatyuk, Sergiy
    Akhmetov, Berik
    Kozlovskyi, Valeriy
    Kinzeryavyy, Vasyl
    Aleksander, Marek
    Prysiazhnyi, Dmytro
    ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION III, 2020, 1126 : 93 - 104
  • [39] The design and implementation of a secure auction service
    Franklin, MK
    Reiter, MK
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (05) : 302 - 312
  • [40] Secure JAVA']JAVA applets and applications: Guidelines and lessons learnt from the JAVA']JAVA security model
    Bichindaritz, I
    Siadak, MF
    Jocom, J
    Moinpour, C
    Donaldson, G
    Bush, N
    Chapko, M
    Sullivan, KM
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1999, : 1028 - 1028