共 50 条
- [21] Security and Network Performance Evaluation of KK' Cryptographic Technique in Mobile Adhoc Networks 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1151 - 1156
- [22] Redesigning QR Code Ecosystem with Improved Mobile Security IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 678 - 679
- [23] Mobile code security by Java']Java bytecode instrumentation DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 27 - 40
- [24] A Father/Foster security protocol for mobile agent code INFORMATION MANAGEMENT IN THE NETWORKED ECONOMY: ISSUES & SOLUTIONS, 2007, : 46 - 50
- [25] Addressing security issues in programming languages for mobile code NINTH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 1998, : 288 - 293
- [26] The Security of Cryptographic Hashes PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 103 - 108
- [27] Automating Cryptographic Code Generation PROCEEDINGS OF THE 2022 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2022, 2022, : 3 - 3
- [28] Verified Cryptographic Code for Everybody COMPUTER AIDED VERIFICATION (CAV 2021), PT I, 2021, 12759 : 645 - 668