Subject
Artificial Intelligence,Information Systems,Software
Reference30 articles.
1. Al-Jaljouli , R. and Abawajy , J. 2007 . Secure Mobile Agent-based E-Negotiation for On-Line Trading.International Symposium on Signal Processing and Information Technology, Giza, 2007, 610–615. IEEE
2. An Improved Itinerary Recording Protocol for Securing Distributed Architectures Based on Mobile Agents
3. Balogh , A. , Brazier , F. , Hofman , R. , Tanenbaum , A. , and Noordende , G. 2007 . A Secure Jailing System for Confining Untrusted Applications. InProceedings of the 2nd International Conference on Security and Cryptograpy (SECRYPT), pp. 28—31. SECRYPT
4. Security for mobile agents: Authentication and state appraisal
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Host Platform Security and Mobile Agent Classification: A Systematic Study;Computer Networks and Inventive Communication Technologies;2021
2. Mobile Agents System Security;ACM Computing Surveys;2018-09-30