Tekbacak, 2006 - Google Patents
Developing a security mechanism for software agentsTekbacak, 2006
View PDF- Document ID
- 6009422786981252614
- Author
- Tekbacak F
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
This thesis proposes a message security solution on multi-agent systems. A general security analysis based on properties of software agents is presented along with an overview of security measures applicable to multi-agent systems. A security design and implementation …
- 238000004891 communication 0 abstract description 99
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Deco: Liberating web data using decentralized oracles for tls | |
US7752431B2 (en) | Virtual distributed security system | |
US9256763B2 (en) | Method and system for providing a public key/secret key pair for encrypting and decrypting data | |
US20030074579A1 (en) | Virtual distributed security system | |
Jost et al. | A unified and composable take on ratcheting | |
Cachin et al. | A secure cryptographic token interface | |
Borselius | Multi-agent system security for mobile communication | |
Abram et al. | Oblivious TLS via multi-party computation | |
Bindel et al. | To attest or not to attest, this is the question–Provable attestation in FIDO2 | |
GB2395304A (en) | A digital locking system for physical and digital items using a location based indication for unlocking | |
Lee | Guideline for implementing cryptography in the federal government | |
Tekbacak | Developing a security mechanism for software agents | |
Beguinet et al. | Formal Verification of a Post-Quantum Signal Protocol with Tamarin | |
Kolachana et al. | Application of Quantum Algorithms for Network Protocols | |
Gilda et al. | None Shall Pass: A blockchain-based federated identity management system | |
Nielson | Cryptographic Systems Technologies | |
Schmidt | ASITA: Advanced security infrastructure for multi-agent-applications in the telematic area | |
Khan et al. | In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security | |
He et al. | Security infrastructure for software agent society | |
Huang et al. | Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation | |
Lo | A framework for cryptography algorithms on mobile devices | |
Zhang | Development of security features for the FIPA architecture. | |
Neupane | Long-Term Secure Asymmetric Group Key Agreement | |
Holappa | Security threats and requirements for Java-based applications in the networked home environment | |
Alves | A Secure Session-Based Distributed Programming Language |