The Solution for Anonymous Access of IT Services and its Application to e-health Counselling
暂无分享,去创建一个
[1] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[2] Rafal Leszczyna,et al. Performance analysis of untraceability protocols for mobile agents using an adaptable framework , 2006, AAMAS '06.
[3] Sebastian Banescu,et al. SECURITY OF MOBILE AGENTS , 2007 .
[4] Thomas Kunz,et al. Using Mobile Agents for Privacy Amplification in the Trade with Tangible Goods , 2002 .
[5] Dirk Westhoff,et al. Protecting a Mobile Agent's Route against Collusions , 1999, Selected Areas in Cryptography.
[6] Michael Luck,et al. Agent technology: Enabling next generation computing , 2003 .
[7] Roger Tagg,et al. Intelligent Software Agents , 2005, Encyclopedia of Information Science and Technology.
[8] Rafal Leszczyna,et al. Untraceability of mobile agents , 2005, AAMAS '05.
[9] Joseph Y. Halpern,et al. Anonymity and information hiding in multiagent systems , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[10] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[11] Arthur C. Graesser,et al. Is it an Agent, or Just a Program?: A Taxonomy for Autonomous Agents , 1996, ATAL.