Authentication Mechanisms for Mobile Agents
暂无分享,去创建一个
[1] Joe Kilian,et al. One-Round Secure Computation and Secure Autonomous Mobile Agents , 2000, ICALP.
[2] M. Sherif,et al. Protocols for Secure Electronic Commerce , 2000 .
[3] Pankaj Kumar. J2EE Security for Servlets, EJBs, and Web Services: Applying Theory and Standards to Practice , 2003 .
[4] Roger Riggs,et al. Pickling State in the Java System , 1996, Comput. Syst..
[5] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.
[6] James A. Gosling,et al. The java language environment: a white paper , 1995 .
[7] John Zachary. Protecting Mobile Code in the Wild , 2003, IEEE Internet Comput..
[8] Gregory V. Wilson,et al. Smart Messages: An Object-Oriented Communication Mechanism for Parallel Systems , 1996, Comput. Syst..
[9] Charles P. Pfleeger,et al. Security in computing , 1988 .
[10] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[11] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[12] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[13] Giovanni Vigna,et al. Protecting Mobile Agents through Tracing , 1997 .
[14] William Stallings,et al. Cryptography and network security , 1998 .
[15] N. Asokan,et al. Protecting the computation results of free-roaming agents , 2005, Personal Technologies.
[16] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[17] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[18] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[19] Scott Oaks,et al. Java Security , 1998 .