Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection
暂无分享,去创建一个
[1] Lars Rasmusson,et al. Simulated social control for secure Internet commerce , 1996, NSPW '96.
[2] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[3] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[4] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[5] Fritz Hohl,et al. Mobile Agent Systems: What is Missing? , 1997 .
[6] Giovanni Vigna,et al. Protecting Mobile Agents through Tracing , 1997 .
[7] Catherine Meadows. Detecting Attacks on Mobile Agents , 1997 .
[8] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[9] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[10] Rüdiger Zarnekow,et al. Intelligent software agents - foundations and applications , 1998 .
[11] Nicholas R. Jennings,et al. Agent Theories, Architectures, and Languages: A Survey , 1995, ECAI Workshop on Agent Theories, Architectures, and Languages.
[12] JoAnne Yates,et al. Electronic markets and electronic hierarchies , 1987, CACM.
[13] Beat F. Schmid,et al. Elektronische Märkte , 1993, Wirtschaftsinf..
[14] R. Coase,et al. The Problem of Social Cost , 1960, The Journal of Law and Economics.