1. Hohl, F.: An approach to solve the problem of malicious hosts, retrieved from
http://www.informatik.uni-stuttgart.de
2. Wilhelm, U.G.: A Technical Approach To Privacy Based On Mobile Agents Protected By Tamper-Resistant Hardware. PhD thesis, Ecole Polytechnique Fédérale de Lausanne (1999)
3. Maña, A., Pimentel, E.: An efficient software protection scheme. University of Málaga, Spain (2002)
4. Lecture Notes in Computer Science;F. Hohl,1998
5. Sander, T., Tshudin, C.: Towards mobile cryptography. In: Proceeding 1998 IEEE Symposium on Security and Privacy, Oakland, California, pp. 215–224 (May 1998)