1. Hacini, S., Guessoum, Z., Boufaida, Z.: TAMAP: a new trust-based approach for mobile agent protection. Journal of Compute Viro 1 3, 267–283 (2007)
2. Lecture Notes in Computer Science;M. Yao,2004
3. Xu, D., Ham, L., NarasimhanAn, M., Junzhou, L.: Improved Free-Roaming Mobile Agent Security Protocol again Colluded Truncation Attacks. In: Proceedings of the 30th Annual (COMPSAC 2006), vol. 2, pp. 309–314. IEEE Computer Society, Los Alamitos (2006)
4. Jiang, Y.c., Xia, Z.Y., Zhong, Y.P., Zhang, S.Y.: Defend mobile agent against malicious hosts in migration itineraries. Microprocessors And Microsystems 28, 531–546 (2004)
5. Green, S., Hurst, L.: Software Agents: A Review. Trinity College Dublin Broadcom Eireanm Research Ltd., (I997)