Author:
Vitek Jan,Castagna Giuseppe
Publisher
Springer Berlin Heidelberg
Reference38 articles.
1. M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The Spi calculus. In Proceedings of the Fourth ACM Conference on Computer and Communications Security, Zürich, April 1997. ACM Press, 1997. Long version as Technical Report 414, University of Cambridge.
2. ACM. Proceedings of the 23rd Annual Symposium on Principles of Programming Languages (POPL) (St. Petersburg Beach, Florida), Jan. 1996.
3. G. Agha. Actors — A model of concurrent computation in distributed systems. The MIT Press, 1986.
4. Lect Notes Comput Sci;R. M. Amadio,1993
5. R. M. Amadio. An asynchronous model of locality, failure, and process mobility. In Proceedings of COORDINATION’ 97. Springer-Verlag, 1997. Full version as Rapport Interne, LIM Marseille, and Rapport de Recherche RR-3109, INRIA Sophia-Antipolis, 1997.
Cited by
70 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Constraint Solving-Based Automatic Generation of Mobile Agent Itineraries;Artificial Intelligence and Soft Computing;2016
2. Constraint Solving-Based Itineraries for Mobile Agents;Distributed Computing and Artificial Intelligence, 13th International Conference;2016
3. Formalising Security in Ubiquitous and Cloud Scenarios;Computer Information Systems and Industrial Management;2012
4. Mobile AgentsMobile agents;Computational Complexity;2012
5. A Model of Evolvable Components;Trustworthly Global Computing;2010