Clever Use of Trusted Third Parties for Mobile Agent Security
Clark, Andrew, Giansiracusa, Michelangelo, & Russell, Selwyn (2004) Clever Use of Trusted Third Parties for Mobile Agent Security. In Xue, L, Zhou, J, Yung, M, & Markus, J (Eds.) The Second International Conference on Applied Cryptography and Network Security., 8-11 June 2004, Yellow Mountain, China.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Conference Paper|
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology|
|Deposited On:||17 Jun 2009 15:15|
|Last Modified:||29 Feb 2012 13:07|
Repository Staff Only: item control page