Securing the itinerary of mobile agents through a non-repudiation protocol
暂无分享,去创建一个
[1] Joan Borrell,et al. Practical Approach to Anonymity in Large Scale Electronic Voting Schemes , 1999, NDSS.
[2] Fritz Hohl. A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.
[3] Volker Roth,et al. Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.
[4] Markus Straßer,et al. Providing Reliable Agents for Electronic Commerce , 1998, Trends in Distributed Systems for Electronic Commerce.
[5] Dieter Gollmann,et al. Observations on Non-repudiation , 1996, ASIACRYPT.
[6] Levente Buttyán,et al. Protecting the Itinerary of Mobile Agents , 1998, ECOOP Workshops.
[7] Yi Cheng. Acomprehensive security infrastructure for mobile agents , 1997 .
[8] Li Gong. Java Security Architecture (JDK1.2) , 1997 .