Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,564,901 papers from all fields of science
Search
Sign In
Create Free Account
Encrypted function
Known as:
Encrypted functions
, Mobile cryptography
An encrypted function is an attempt to provide mobile code privacy without providing any tamper-resistant hardware. It is a method where in mobile…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Algorithm
Central processing unit
Cryptography
Interpreter (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A DNA Based Scheme to Improve SMS Cryptography
Shivani
,
M. Sachdeva
2014
Corpus ID: 212505148
: Mobile Cryptography provides the secure information transmission of message. In this present work, A DNA enabled approach is…
Expand
2012
2012
Non-interactive Exponential Homomorphic Encryption Algorithm
Liang Chen
,
T. Zhang
,
Wen Liu
,
C. Gao
International Conference on Cyber-Enabled…
2012
Corpus ID: 11693332
Homomorphic encryption can be applied to non-interactive evaluation of encrypted functions. The known homomorphism includes…
Expand
Highly Cited
2011
Highly Cited
2011
Obfuscation Techniques for Mobile Agent code confidentiality
S. Armoogum
,
Asvin Caully
2011
Corpus ID: 14573662
Mobile code, typically mobile agent applications, promises many advantages and is suitable to many different types of…
Expand
2010
2010
A New Secret Sharing Scheme Based on Commutative Encrypted Function
Junjie He
,
Ximei Li
,
L. Li
,
Chunming Tang
International Forum on Information Technology and…
2010
Corpus ID: 6521993
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution…
Expand
2010
2010
Secure two-party comparing protocol based on evaluation of encrypted functions
Xu Yong
2010
Corpus ID: 64416156
Secure two-party comparing is a special case and a basic module of secure computations,and is applied in mobile code and e…
Expand
2009
2009
Mobile Code and Security Issues
E. S. Samundeeswari
,
F. Mary
,
Magdalene Jane
,
P. S. G. R. Krishnammal
,
India.
2009
Corpus ID: 168455615
Over the years computer systems have evolved from centralized monolithic computing devices supporting static applications, into…
Expand
2005
2005
Enhancing Countermeasure Techniques in Agent Systems
Gabriel Becerra
,
Jordan Kidney
,
Jason Heard
,
R. Kremer
,
J. Denzinger
2005
Corpus ID: 14502683
Multi-agent systems are one of the fastest growing areas in computer science thanks to their synergistic properties and the…
Expand
2003
2003
On The Secure Evaluation Of Encrypted Polynomials Over Z / n Z DRAFT
Alice
,
Bob
2003
Corpus ID: 17433182
An interesting application of cryptography is in the reduction of software piracy and the protection of intellectual property…
Expand
2002
2002
THE SECURE TRUSTED AGENT PROXY SERVER ARCHITECTURE
Michelangelo Giansiracusa
2002
Corpus ID: 15309245
A method and apparatus for applying a uniform sealant coating over the portion of a fastener (14) exposed above a panel (10, 12…
Expand
2000
2000
Implementing Secure Distributed Computing with Mobile Agents
G. Neven
,
E. V. Hoeymissen
,
B. Decker
,
F. Piessens
2000
Corpus ID: 16199231
Secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE