Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "b049c84d-17c9-49db-9451-6183b58f8566"}, "_deposit": {"id": "4726", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4726"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4726", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Novel Approach To Achieve Optimized Obfuscation Technique For Mobile Agent.", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The main area of discussion of our paper “Security ofMobile Agent” is on the host platform attacking themobile agents. Malicious host is a system in networkwhich can take advantage of a mobile agent. Amalicious host can attack the agent and modify, stealcorrupting its code or state. It can deny services, returnfalse results or even terminate it completely. Providingsecurity against the host is difficult because the hostneeds to have the full information of the code and thestate in order to execute the agent. We haveimplemented a new strategy security mode to secure ourmobile agent such that its code is protected onchannel/host so that no malicious or third party canaccess it and the confidentiality may be preserved andultimately working on the problem of host attacking theagent. Our code is assembled in executable form at runtime so that execution platform cannot get enough timeto understand it. This technique is motivated fromobfuscation technique and tries to reduce the coherentproblem of trade off."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Vaish, Abhishek"}, {"subitem_authors_fullname": "Jha, Anand Sanjeev Kumar Atul Krishna"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/433"}, "item_title": "A Novel Approach To Achieve Optimized Obfuscation Technique For Mobile Agent.", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004726", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-04"}, "publish_date": "2019-07-04", "publish_status": "0", "recid": "4726", "relation": {}, "relation_version_is_last": true, "title": ["A Novel Approach To Achieve Optimized Obfuscation Technique For Mobile Agent."], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

A Novel Approach To Achieve Optimized Obfuscation Technique For Mobile Agent.

http://hdl.handle.net/20.500.12678/0000004726
http://hdl.handle.net/20.500.12678/0000004726
f4dfb267-775c-4b78-9c6f-84b08b00d1a2
b049c84d-17c9-49db-9451-6183b58f8566
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:17:36.767599
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL