Protecting Mobile Agent Itineraries
暂无分享,去创建一个
Joan Borrell | Joan Mir | J. Borrell | J. Mir
[1] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[2] C. Stefanelli,et al. Mobile agents protection in the Internet environment , 1999, Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032).
[3] David Wong,et al. Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.
[4] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[5] Dirk Westhoff,et al. Methods for Protecting a Mobile Agent's Route , 1999, ISW.
[6] Dirk Westhoff,et al. Protecting a Mobile Agent's Route against Collusions , 1999, Selected Areas in Cryptography.
[7] Markus Straßer,et al. Providing Reliable Agents for Electronic Commerce , 1998, Trends in Distributed Systems for Electronic Commerce.
[8] Winfried Lamersdorf,et al. Trends in Distributed Systems for Electronic Commerce , 1998, Lecture Notes in Computer Science.
[9] Carles Sierra,et al. Agent-Mediated Electronic Commerce , 2004, Autonomous Agents and Multi-Agent Systems.
[10] Joan Borrell,et al. Implementation of Secure Architectures for Mobile Agents in MARISM-A , 2002, MATA.
[11] Giovanni Vigna,et al. Mobile Agents and Security , 1998, Lecture Notes in Computer Science.
[12] Kwangjo Kim,et al. Information Security and Cryptology — ICISC 2001 , 2002, Lecture Notes in Computer Science.
[13] James E. White,et al. Mobile Agents , 1997, Lecture Notes in Computer Science.
[14] N. Asokan,et al. Protecting the computation results of free-roaming agents , 1998, Personal Technologies.
[15] Friedemann Mattern,et al. Agent Systems, Mobile Agents, and Applications , 2000, Lecture Notes in Computer Science.
[16] Anand R. Tripathi,et al. Security in mobile agent systems , 1998 .
[17] Volker Roth. Programming Satan's Agents , 2001, Electron. Notes Theor. Comput. Sci..
[18] Volker Roth,et al. Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.
[19] Andreu Riera,et al. Securing the itinerary of mobile agents through a non-repudiation protocol , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[20] Joan Borrell,et al. Protecting General Flexible Itineraries of Mobile Agents , 2001, ICISC.
[21] Jan Vitek,et al. Secure Internet Programming , 1999 .
[22] Anand R. Tripathi,et al. Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..
[23] Volker Roth,et al. On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection , 2001, Mobile Agents.
[24] E. Horlait. Mobile Agents for Telecommunication Applications , 2003, Lecture Notes in Computer Science.
[25] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[26] Volker Roth,et al. Encrypting Java Archives and Its Application to Mobile Agent Security , 2001, AgentLink.
[27] Jianying Zhou. Non-Repudiation in Electronic Commerce , 2002, DEXA Workshops.
[28] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[29] James Lyle Peterson,et al. Petri net theory and the modeling of systems , 1981 .
[30] Günter Karjoth,et al. Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces , 2000, ASA/MA.