Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Encrypted function

Known as: Encrypted functions, Mobile cryptography 
An encrypted function is an attempt to provide mobile code privacy without providing any tamper-resistant hardware. It is a method where in mobile… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Mobile code, typically mobile agent applications, promises many advantages and is suitable to many different types of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 3
  • figure 4
2011
2011
With the advancement of communication technology, network infrastructure has been shifting towards distributed paradigm from… Expand
2010
2010
We analyze a key agreement algorithm realization, not using Diffie-Hellman approach, but using matrix powers and conjugation… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2004
Highly Cited
2004
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However… Expand
  • figure 1
  • figure 2
2004
2004
Abstract In this paper, we first study the chaotic synchronization phenomenon of the suspended track with moving load system and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2004
2004
We present a scheme to protect mobile code from malicious hosts. We propose a transformation scheme that changes the semantics of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
2002
2002
A method and apparatus for applying a uniform sealant coating over the portion of a fastener (14) exposed above a panel (10, 12… Expand
  • figure 1
2000
2000
Secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants… Expand
  • figure 3
  • figure 4
  • figure 5
  • table 1
  • figure 6
1999
1999
In this paper we characterize the different tasks mobile agents can perform for their users on electronic markets. These tasks… Expand
  • figure 2
Highly Cited
1998
Highly Cited
1998
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against… Expand
  • figure 1