Mobile Agents and the Deus Ex Machina
暂无分享,去创建一个
[1] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[2] Wayne A. Jansen,et al. Mobile Agent Security , 1999 .
[3] Levente Buttyán,et al. Introducing Trusted Third Parties to the Mobile Agent Paradigm , 2001, Secure Internet Programming.
[4] Siani Pearson. Trusted Agents that Enhance User Privacy by Self-Profiling , 2002 .
[5] Aaron Weiss. Trusted computing , 2006, NTWK.
[6] Volker Roth,et al. Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.
[7] Munindar P. Singh,et al. Agents on the Web: Mobile Agents , 1997, IEEE Internet Comput..
[8] James E. White,et al. Mobile Agents , 1997, Lecture Notes in Computer Science.
[9] Siani Pearson. How trusted computers can enhance privacy preserving mobile applications , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[10] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[11] Patrick LeBlanc,et al. Self-Protecting Mobile Agents Obfuscation Report Final report , 2003 .
[12] Christine Julien,et al. A secure modular mobile agent system , 2006, SELMAS '06.
[13] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[14] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[15] Stephen Crane. Privacy Preserving Trust Agents , 2004 .