[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/647183.719497guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study

Published: 22 August 2000 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2003)(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutionsACM Transactions on Internet Technology (TOIT)10.1145/643477.6434793:1(28-48)Online publication date: 1-Feb-2003
  1. On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
    August 2000
    499 pages
    ISBN:0792379144

    Publisher

    Kluwer, B.V.

    Netherlands

    Publication History

    Published: 22 August 2000

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2003)(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutionsACM Transactions on Internet Technology (TOIT)10.1145/643477.6434793:1(28-48)Online publication date: 1-Feb-2003

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media