A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] A. Kuznetsov. Synthetic Biology as a Proof of Systems Biology , 2009 .
[3] Mahbubur Rahman Syed. Multimedia technologies : concepts, methodologies, tools, and applications / Syed Mahbubur Rahman [editor]. , 2008 .
[4] Wei Liang-fen. A Migration Mechanism of Mobile Agent System Supporting Security and Fault-Tolerance , 2007 .
[5] Matthew Thompson,et al. A secure marketplace for mobile Java agents , 1998, AGENTS '98.
[6] Mei-Ling Shyu,et al. Weighted Association Rule Mining for Video Semantic Detection , 2010, Int. J. Multim. Data Eng. Manag..
[7] N. Ch. S. N. Iyengar,et al. A Model for Mobile Agent Security in E-Business Applications , 2007 .
[8] Zbigniew Hulicki. Multimedia Communication Services on Digital TV Platforms , 2005 .
[9] Yannis Manolopoulos,et al. Building Tag-Aware Groups for Music High-Order Ranking and Topic Discovery , 2010, Int. J. Multim. Data Eng. Manag..
[10] T. Kidd. Investing in Multimedia Agents for E-Learning Solutions , 2009 .
[11] M. Amin,et al. Defining new markets for intelligent agents , 2000 .
[12] Ismail Khalil,et al. Handbook of Research on Mobile Multimedia , 2006 .
[13] Leon Sterling,et al. Privacy and forensics investigation process: The ERPINA protocol , 2008, Comput. Stand. Interfaces.
[14] Lin Chen. Security model of mobile agent in e-commerce , 2005 .
[15] Peter J. Natale. Media Channel Preferences of Mobile Communities , 2009 .
[16] Michela Bertolotto,et al. Using Multimedia and Virtual Reality for Web-Based Collaborative Learning on Multiple Platforms , 2008 .
[17] Mazliza Othman,et al. Secure and auditable agent-based e-marketplace framework for mobile users , 2008, Comput. Stand. Interfaces.
[18] Liu Wei-feng. Research of Mobile Agent-based Security in the E-commerce , 2004 .
[19] Yi Chen,et al. Synthetic Video Generation for Evaluation of Sprite Generation , 2010, Int. J. Multim. Data Eng. Manag..
[20] Sun Ling-fang. A Secure Technology of E-Commerce Based On SET , 2007 .
[21] Xin Luo,et al. Encyclopedia of Multimedia Technology and Networking , 2008 .
[22] Touradj Ebrahimi,et al. Robust Duplicate Detection of 2D and 3D Objects , 2010, Int. J. Multim. Data Eng. Manag..
[23] Pattie Maes,et al. Agents that buy and sell , 1999, CACM.
[24] Elaine B. Barker,et al. SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .
[25] S. Kittitornkun,et al. Optimizing RSA encryption for ARM microprocessor , 2008, 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.
[26] Saad Harous. Routing Algorithms for Mobile Ad Hoc Networks , 2009 .