Mobile agents integrity in e-commerce applications
暂无分享,去创建一个
[1] Michael P. Wellman,et al. The Auction Manager: Market Middleware for Large-Scale Electronic Commerce , 1998, USENIX Workshop on Electronic Commerce.
[2] Antonio Corradi,et al. Melding Abstractions with Mobile Agents , 1998, CIA.
[3] George Cybenko,et al. AGENT TCL: Targeting the Needs of Mobile Computers , 1997, IEEE Internet Comput..
[4] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[5] Giovanni Vigna,et al. Mobile Agents and Security , 1998, Lecture Notes in Computer Science.
[6] Pattie Maes,et al. Agent-mediated Electronic Commerce : A Survey , 1998 .
[7] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[8] John K. Ousterhout,et al. The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.
[9] N. Asokan,et al. Protecting the computation results of free-roaming agents , 1998, Personal Technologies.
[10] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.
[11] Pattie Maes,et al. Agent-mediated electronic commerce: issues, challenges and some viewpoints , 1998, AGENTS '98.
[12] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[13] Winfried Lamersdorf,et al. Agents, services, and electronic markets: how do they integrate? , 1996 .
[14] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.