1. Abdul-Rahman, A., Hailes, S.: Using recommendations for managing trust in distributed systems. In: Proceedings of IEEE Malaysia International Conference on Communication’97 (MICC’97), Kuala Lumpur, Malaysia (1997)
2. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of obfuscating programs. Advances in cryptology. In: Proceedings of Crypto’2001, Lecture Notes in Computer Science, Vol. 2139, pp. 1–18 (2001)
3. Beaucamps, P., Filiol, E.: On the possibility of practically obfuscating program—towards a unified perspective of code protection. WTCV’06 Special Issue, G. Boufante, I., Marion, J.Y. (eds) J. Comput.Virol. 3(1) (2007)
4. Beimel A. and Burmester M. (2000). Computing functions of a shared secret. SIAM J. Discrete Math. 13(3): 324–345
5. Bellavista, P., Corradi, A., Frederici C., Montanari R., Tibaldi D.: Security for mobile agents: issues and challenges. In: Mahgoub, I., Ilyas, M. (eds) The Book Handbook of Mobile Computing. CRC, Boca Raton (2004)