Black Hole Search by Mobile Agents in Hypercubes and Related Networks
暂无分享,去创建一个
Nicola Santoro | Paola Flocchini | Giuseppe Prencipe | Stefan Dobrev | Rastislav Kralovic | Peter Ruzicka
[1] Jon Ølnes,et al. Mobile Agent Security - Issues and Directions , 1999, IS&N.
[2] Fritz Hohl,et al. A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[3] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[4] Kwok-Wai Cheung,et al. Protecting Mobile Agents Against Malicious Hosts by Intention Spreading , 1999, PDPTA.
[5] Jan Vitek,et al. Mobile Computations and Hostile Hosts , 1999 .
[6] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[7] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[8] Nicola Santoro,et al. Searching for a black hole in arbitrary networks: optimal mobile agent protocols , 2002, PODC '02.
[9] Ian T. Foster,et al. The data grid: Towards an architecture for the distributed management and analysis of large scientific datasets , 2000, J. Netw. Comput. Appl..
[10] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[11] Rolf Oppliger. Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..