2010
DOI: 10.1007/978-3-642-14706-7_22
|View full text |Cite
|
Sign up to set email alerts
|

In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…An approach for protecting agents by utilising tamper‐resistant cryptographic hardware is presented in . The proposed agent migration protocol (Secure Migration Library) is based on the use of Trusted Computing technology that attempts to protect the agent from malicious hosts.…”
Section: Node Technologiesmentioning
confidence: 99%
“…An approach for protecting agents by utilising tamper‐resistant cryptographic hardware is presented in . The proposed agent migration protocol (Secure Migration Library) is based on the use of Trusted Computing technology that attempts to protect the agent from malicious hosts.…”
Section: Node Technologiesmentioning
confidence: 99%
“…An approach for protecting agents by utilising tamper-resistant cryptographic hardware is presented in [255]. The proposed agent migration protocol (Secure Migration Library -SecMiLiA) is based on the use of Trusted Computing technology that attempts to protect the agent from malicious hosts.…”
Section: Tamper-resistant Modulesmentioning
confidence: 99%