Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,603,774 papers from all fields of science
Search
Sign In
Create Free Account
Encrypted function
Known as:
Encrypted functions
, Mobile cryptography
An encrypted function is an attempt to provide mobile code privacy without providing any tamper-resistant hardware. It is a method where in mobile…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Algorithm
Central processing unit
Cryptography
Interpreter (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Obfuscation Techniques for Mobile Agent code confidentiality
S. Armoogum
,
Asvin Caully
2011
Corpus ID: 14573662
Mobile code, typically mobile agent applications, promises many advantages and is suitable to many different types of…
Expand
2011
2011
Protection of mobile agent and its itinerary from malicious host
S. Srivastava
,
G. Nandi
International Conference on Computing and…
2011
Corpus ID: 16453254
With the advancement of communication technology, network infrastructure has been shifting towards distributed paradigm from…
Expand
2010
2010
Research on improved algorithm based on Encryption algorithm of Hill
Hu Lihong
International Conference on Computer Application…
2010
Corpus ID: 17942198
The Encryption algorithm of Hill is Password system of many forms and was put forward by Hill in 1929. Basic thought of Hill…
Expand
2010
2010
Conjugation as public key agreement protocol in mobile cryptography
Vittorio Ottaviani
,
A. Zanoni
,
M. Regoli
International Conference on Security and…
2010
Corpus ID: 14649579
We analyze a key agreement algorithm realization, not using Diffie-Hellman approach, but using matrix powers and conjugation…
Expand
2006
2006
A proposal of encoded computations for distributed massively multiplayer online services
Keiichi Endo
,
Minoru Kawahara
,
Yutaka Takahashi
IFAC Symposium on Advances in Control Education
2006
Corpus ID: 1254797
This paper deals with Massively Multiplayer Online services, which are used to interact with other user in real time. Although it…
Expand
2004
2004
Chaos synchronization and chaos anticontrol of a suspended track with moving loads
Z. Ge
,
Hong-Wen Wu
2004
Corpus ID: 55764073
2004
2004
Semantic Encryption Transformation Scheme
W. Thompson
,
Alec Yasinsac
,
J. McDonald
Parallel and Distributed Computing Systems (ISCA)
2004
Corpus ID: 742788
We present a scheme to protect mobile code from malicious hosts. We propose a transformation scheme that changes the semantics of…
Expand
Review
2002
Review
2002
Securing mobile agents through evaluation of encrypted functions
Hyungjick Lee
,
J. Alves-Foss
2002
Corpus ID: 14202995
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However…
Expand
2002
2002
THE SECURE TRUSTED AGENT PROXY SERVER ARCHITECTURE
Michelangelo Giansiracusa
2002
Corpus ID: 15309245
A method and apparatus for applying a uniform sealant coating over the portion of a fastener (14) exposed above a panel (10, 12…
Expand
2000
2000
Implementing Secure Distributed Computing with Mobile Agents
G. Neven
,
E. V. Hoeymissen
,
B. Decker
,
Frank Piessens
2000
Corpus ID: 16199231
Secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required