Author of the publication

A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.

, , , and . ISCC, page 251-256. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CERVANTES - A Certificate Validation Test-Bed., , , and . EuroPKI, volume 3093 of Lecture Notes in Computer Science, page 28-42. Springer, (2004)DARPA's adaptive computing systems program.. ASP-DAC, page 464. ACM, (2003)BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs., , , , , and . Mob. Inf. Syst., 9 (4): 347-370 (2013)Desing and Evaluation of Certificate Revocation Systems.. Polytechnic University of Catalonia, Spain, (2003)A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems., , , , and . WISTP, volume 5746 of Lecture Notes in Computer Science, page 12-27. Springer, (2009)Evaluation of Cryptographic Capabilities for the Android Platform., , , , and . FNSS, volume 523 of Communications in Computer and Information Science, page 16-30. Springer, (2015)Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts., , , and . ICWE, volume 2722 of Lecture Notes in Computer Science, page 289-292. Springer, (2003)Analysis of TCP variants over a QoS DVB-S2 system., , , , and . PE-WASUN, page 121-124. ACM, (2011)Analysis of peer-to-peer distributed reputation schemes., , and . CollaborateCom, IEEE Computer Society / ICST, (2005)Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT)., , , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 119-127. Springer, (2005)