Implementation of Trust and Reputation Management for Free-Roaming Mobile Agent Security
暂无分享,去创建一个
[1] C. Chellappan,et al. Identifying the split personality of the malicious host in the mobile agent environment , 2008, 2008 4th International IEEE Conference Intelligent Systems.
[2] Zhiping Jia,et al. Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..
[3] Junmo Xiao,et al. A novel free-roaming mobile agent security protocol against colluded truncation attacks , 2008, 2008 International Conference on Information and Automation.
[4] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[5] Winston K. G. Seah,et al. Routing security and data confidentiality for mobile ad hoc networks , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..
[6] Ed Dawson,et al. An Improved Forward Integrity Protocol for Mobile Agents , 2003, WISA.
[7] Suphithat Songsiri. A new approach for computation result protection in the mobile agent paradigm , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[8] C. Chellappan,et al. Generating routing table for free roaming mobile agent in distributed environment , 2009, Comput. Stand. Interfaces.
[9] C. Chellappan,et al. Free-roaming mobile agent (FRoMA) protection against multiple attacks , 2009 .
[10] Rui Zhang,et al. A Novel Security Protocol to Protect Mobile Agent against Colluded Truncation Attack by Cooperation , 2008, 2008 International Conference on Cyberworlds.
[11] Liu Jun,et al. A Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack without trusted third party , 2010, 2011 International Conference on Business Management and Electronic Information.
[12] Dong-Ik Lee,et al. Data protection in mobile agents; one-time key based approach , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.
[13] Zizette Boufaida,et al. Dynamic Adaptability Using Reflexivity for Mobile Agent Protection , 2008 .
[14] Samuel Pierre,et al. Protection of a mobile agent with a reference clone , 2006, Comput. Commun..
[15] T. Purusothaman,et al. AFDB security protocol against colluded truncation attack in free roaming mobile agent environment , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[16] Behrouz Tork Ladani,et al. Anonymity and security for autonomous mobile agents , 2010, IET Inf. Secur..
[17] Victor K.-W. Wei,et al. Defenses against the Truncation of Computation Results of Free-Roaming Agents , 2002, ICICS.
[18] C. Chellappan,et al. Protecting free-roaming mobile agent against multiple colluded truncation attacks , 2007, MobiMedia.
[19] N. Asokan,et al. Protecting the computation results of free-roaming agents , 2005, Personal Technologies.
[20] Yu-Fang Chung,et al. Efficient migration access control for mobile agents , 2009, Comput. Stand. Interfaces.
[21] Volker Roth,et al. On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection , 2001, Mobile Agents.
[22] Xiaogang Wang,et al. A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards , 2008, ATC.
[23] Anand R. Tripathi,et al. Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..
[24] G. Geetha,et al. Data Security in Free Roaming Mobile Agents , 2011 .
[25] C. Jayakumar,et al. PROTECTION OF FREE ROAMING MOBILE AGENTS USING CUSTOMIZED ROOT CANAL ALGORITHM AGAINST MALICIOUS HOST ATTACKS , 2014 .
[26] G. Geetha,et al. Trust Enhanced Data Security in Free Roaming Mobile agents Using Symmetric Key cryptography , 2011 .
[27] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[28] Xiaofei Wang,et al. Multiple mobile agents' itinerary planning in wireless sensor networks: survey and evaluation , 2011, IET Commun..
[29] Lein Harn,et al. An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[30] M. J. Zemerly,et al. Distributed lightweight Kerberos protocol for Mobile Agent Systems , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).
[31] Mahesh Chandra Govil,et al. Security Issues in Mobile Agents , 2010 .