Mutual Protection of Co-operating Agents
暂无分享,去创建一个
[1] Jan Vitek,et al. Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .
[2] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[3] Christian F. Tschudin,et al. Apoptosis - the Programmed Death of Distributed Services , 2001, Secure Internet Programming.
[4] Giovanni Vigna,et al. Mobile Agents and Security , 1998, Lecture Notes in Computer Science.
[5] Vipin Swarup,et al. Trust Appraisal and Secure Routing of Mobile Agents , 1997 .
[6] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[7] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[8] W. A. Jansen,et al. MOBILE AGENTS AND SECURITY , 1999 .
[9] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[10] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[11] Volker Roth,et al. Access control and key management for mobile agents , 1998, Comput. Graph..
[12] Jan Vitek,et al. Secure Internet Programming , 1999 .
[13] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[14] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[15] Vipin Swarup,et al. Authentication for Mobile Agents , 1998, Mobile Agents and Security.
[16] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .