Encrypted function

Known as: Encrypted functions, Mobile cryptography 
An encrypted function is an attempt to provide mobile code privacy without providing any tamper-resistant hardware. It is a method where in mobile… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1998-2016
012319982016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
A growing number of compute and data storage jobs is performed on remote resources. In a cloud environment the customer can't be… (More)
  • figure 1
  • figure 2
Is this relevant?
2010
2010
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution… (More)
Is this relevant?
2010
2010
We analyze a key agreement algorithm realization, not using Diffie-Hellman approach, but using matrix powers and conjugation… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2009
2009
Mobile code can be considered composing of functions. Sander et al implemented non-interactive evaluation of encrypted functions… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However… (More)
  • figure 1
  • figure 2
Is this relevant?
Review
2003
Review
2003
The mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
An interesting application of cryptography is in the reduction of software piracy and the protection of intellectual property… (More)
  • figure 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This paper addresses the protection of mobile code against cheating and potentially malicious hosts. We point out that the recent… (More)
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Mobile code technology has become a driving force for recent advances in distributed systems. The concept of mobility of… (More)
Is this relevant?