Secure Architecture for m-Health Communications Using Multi-agent Approach
暂无分享,去创建一个
[1] Agostino Poggi,et al. Developing Multi-agent Systems with JADE , 2007, ATAL.
[2] Ramon Martí,et al. Network and Application Security in Mobile e-Health Applications , 2004, ICOIN.
[3] Gerhard Weiss,et al. Multi-Agent Systems , 2013 .
[4] G. Eysenbach. What is e-health? , 2001, Journal of Medical Internet Research.
[5] Jacques Pasquier-Rocha,et al. Enhancing E-Health Information Systems with Agent Technology , 2008, International journal of telemedicine and applications.
[6] Fagen Li,et al. A Secure Mobile Agent Protocol for M-commerce Using Self-Certified Proxy Signcryption , 2009, 2009 Second International Symposium on Information Science and Engineering.
[7] Gregory R. Madey,et al. Tools of the Trade: A Survey of Various Agent Based Modeling Platforms , 2009, J. Artif. Soc. Soc. Simul..
[8] Eugénio C. Oliveira,et al. Multi-agent systems: which research for which applications , 1999, Robotics Auton. Syst..
[9] Ganthan Narayana Samy,et al. Security threats categories in healthcare information systems , 2010, Health Informatics J..
[10] John K. Debenham,et al. An Adaptive, Maintable, Extensible Process Agent , 1999, DEXA.
[11] Hayfa Zgaya,et al. Assignment and Integration of Distributed Transport Services in Agent-Based Architecture , 2006, 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology.
[12] W.D. Yu,et al. A web-based wireless mobile system design of security and privacy framework for u-Healthcare , 2008, HealthCom 2008 - 10th International Conference on e-health Networking, Applications and Services.
[13] Nicholas R. Jennings,et al. A Roadmap of Agent Research and Development , 2004, Autonomous Agents and Multi-Agent Systems.
[14] R. Colemon. Securing Wireless Networks , 2004 .
[15] Jeffrey M. Bradshaw,et al. An introduction to software agents , 1997 .
[16] Kosie Eloff. Mobile devices in education , 2011 .
[17] Wanli Ma,et al. A Multi-agent Security Architecture , 2009, 2009 Third International Conference on Network and System Security.
[18] Vipul Gupta,et al. KSSL: experiments in wireless internet security , 2001 .