1. Lect Notes Comput Sci;W. Farmer,1996
2. Lect Notes Comput Sci;P. Kotzanikolaous,2000
3. H. Kim, J. Baek, B. Lee, and K. Kim, “Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature”, Proc. of SCIS2001, pages 845–850, 2001.
4. P. Kotzanikolaous, G. Katsirelos and V. Chrissikopoulos, “Mobile Agents for Secure Electronic Transactions”, Recent Advances in Signal Processing and Communications, World Scientific and Engineering Society Press, pp. 363–368, 1999.
5. Lect Notes Comput Sci;S. Kim,1997