|
[1]S. G. Akl, P. D. Taylor(1983), “Cryptographic solution to a problem of access control in a hierarchy,” ACM Transactions on Computer Systems” Vol. 1, Issue 3, pp. 239– 248. [2]R. Volker, J.S. Mehrdad(1998), “Access control and key management for mobile agents,” Computer Graphics, Vol. 22, Issue 4, pp. 457– 461. [3]A. Karmouch(1998), “Mobile Software Agents for Telecommunications,” Guest Editorial, IEEE Communications Magazine, Vol. 36, No. 7, July, pp. 24-25. [4]I. C. Lin, H. H. Ou, M. S. Hwang(2004), “Efficient access control and key management schemes for mobile agents,” Computer Standards & Interfaces, Vol. 26, No. 5, pp. 423–433. [5]F. Hohl(1998), “A model of attacks malicious hosts against mobile agents,” Proceedings of the 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, Brussels, Belgium, pp. 105–120. [6]D. B. Lange, M. Oshima(1998), “Programming and Deploying Java Mobile Agents with Aglets, Addison-Wesley Press,” Massachusetts, USA [7]N. Koblitz(1987), “Elliptic Curve Cryptosystems,” Mathematics of Computation, Vol. 48, No. 177, pp. 203-209. [8]V. S. Miller(1986), “Use of Elliptic Curves in Cryptography,” Advances in Cryptology: Proceedings of Crypto ''85, Vol. 218, pp. 417-426. [9]S. T. Wu(2005), “Authentication and Group Secure Communications Using Elliptic Curve Cryptography,” Doctoral Dissertation, National Taiwan University of Science and Technology, Taipei. [10]Y. F. Chung, H. H. Lee, F. Lai and T. S. Chen(2008), “Access control in user hierarchy based on elliptic curve cryptosystem,” Information Sciences, Vol. 178, No. 1, pp. 230-243. [11]C. W. Shieh(2006), “An Efficient Design of Elliptic Curve Cryptography Processor,” Master Thesis, Tatung University, Taipei. [12]K. H. Huang, Y. F. Chung, C. H. Liu, F. Lai and T. S. Chen(2007), “Efficient migration for mobile computing in distributed networks,” Computer Standards & Interfaces. [13]D. Johnson, A. Menezes and S. Vanstone(2001), “The Elliptic Curve Digital Signature Algorithm (ECDSA),” Information Security, Vol. 1, pp. 36-63. [14]L. H. Jen(2005), “Study and Implementation of Elliptic Curve Cryptosystem,” Master Thesis, National Sun Yat-Sen University of Technology, Kaohsiung. [15]J. H. Li(2004), “Hierarchy-Based Key Assignment Scheme with Date-Constraint,” Master Thesis, Feng Chia University, Taichung.
|