A Highly Secure Mobile Agent System Architecture
暂无分享,去创建一个
Shinichi Honiden | Nobukazu Yoshioka | Yasukuni Okataku | Hidetoshi Okutomi | Nobuyuki Ohgishi | S. Honiden | Nobukazu Yoshioka | Y. Okataku | Hidetoshi Okutomi | Nobuyuki Ohgishi
[1] Timothy W. Finin,et al. An Overview of KQML: A Knowledge Query and Manipulation Language , 1991 .
[2] Chang-song Zhou,et al. Extracting information masked by chaos and contaminated with noise: Some considerations on the security of communication approaches using chaos , 1997 .
[3] Kevin M. Short,et al. UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME , 1996 .
[4] Kevin M. Short,et al. Steps Toward Unmasking Secure Communications , 1994 .
[5] Leon O. Chua,et al. Cryptography based on chaotic systems , 1997 .
[6] Kazushi Nakano,et al. A Design of a Nonlinear Decrypter for Chaotic Secure Communications , 2003 .
[7] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.