1. Fritz Hohl. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. InMobile Agents and Security, Giovanni Vigna (ed.), Springer-Verlag, 1998, pp. 92–113. http://www.informatik.uni-stuttgart.de/ipvr/vs/projekte/mole/vignabuch.ps.gz
2. Sergio Loureiro, Refik Molva. Function hiding based on error correcting codes. InInternational Workshop of Cryptographic Techniques and Electronic Commerce, City University of Hong Kong, 1999. ftp://ftp.eurecom.fr/pub/loureiro/cryptec99.ps.gz
3. Giovanni Vigna. Protecting mobile agents through tracing. InMobile object systems ECOOP Workshop’97, 1997. http://arthur.cs.ucdavis.edu./-barnes/seminar/papers/vigna97.ps
4. Zhou Chong, Sun Yongqiang. PTIR: A protocol to detect the attacks of malicious hosts.Journal of Computer Research and Development, 2002, 39(3): 295–300.
5. Carlisle M Adams, Henk Meijer. Security-related comments regarding McEliece’s public-key cryptosystem. InAdvances in Cryptology-CRYPTO’87, Carl Pmerance (ed), LNCS 293, Springer-Verlag, 1988, pp. 224–228.