Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Encrypted function

Known as: Encrypted functions, Mobile cryptography 
An encrypted function is an attempt to provide mobile code privacy without providing any tamper-resistant hardware. It is a method where in mobile… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Mobile agent is gaining attention in the research community because of its potential to replace traditional client-Server… Expand
Is this relevant?
2010
2010
We analyze a key agreement algorithm realization, not using Diffie-Hellman approach, but using matrix powers and conjugation… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2010
2010
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution… Expand
Is this relevant?
2009
2009
Over the years computer systems have evolved from centralized monolithic computing devices supporting static applications, into… Expand
Is this relevant?
2006
2006
This paper deals with Massively Multiplayer Online services, which are used to interact with other user in real time. Although it… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However… Expand
  • figure 1
  • figure 2
Is this relevant?
2004
2004
We propose a security approach for mobile agents, which protects mobile agents from malicious hosts. Our new approach prevents… Expand
Is this relevant?
Review
2002
Review
2002
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We address the protection of mobile code against cheating and potentially malicious hosts. We point out that the recent approach… Expand
  • figure 1
Is this relevant?
Highly Cited
1998
Highly Cited
1998
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against… Expand
  • figure 1
Is this relevant?