1. Security issues in mobile code systems;Chess,1998
2. Time limited blackbox security: protecting mobile agents from malicious hosts;Hohl,1998
3. A protocol to detect malicious hosts attacks by using reference states;Hohl,2000
4. Cryptographic traces for mobile agents, Mobile Agents and Security;Vigna,1998
5. Security for mobile agents: authentication and state appraisal;Farmer,1996