A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments
暂无分享,去创建一个
[1] Volker Roth,et al. Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.
[2] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[3] Samuel Pierre,et al. An improved itinerary recording protocol for securing distributed architectures based on mobile agents , 2005, Mob. Inf. Syst..
[4] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[5] Robbert van Renesse,et al. Cryptographic support for fault-tolerant distributed computing , 1996, EW 7.
[6] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[7] S. Pierre,et al. Secure protocol in mobile agent environment , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[8] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[9] Jan Camenisch,et al. Cryptographic security for mobile code , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[10] Anand R. Tripathi,et al. A security architecture for mobile agents in Ajanta , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[11] Fritz Hohl,et al. A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[12] David Wong,et al. Security and reliability in Concordia , 1999 .