共 22 条
[1]
Ahmed T.M., Using secure-image mechanism to protect mobile agent against malicious hosts, World Academy of Science, Engineering and Technology, 59, pp. 439-444, (2009)
[2]
Armoogum S., Caully A., Obfuscation techniques for mobile agent code confidentiality, Journal of Information & Systems Management, 1, 1, pp. 25-36, (2011)
[3]
Benachenhou L., Pierre S., Protection of a mobile agent with a reference clone, Computer Communication, 29, 2, pp. 268-278, (2006)
[4]
Bierman E., Cloete E., Classification of malicious host threats in mobile agent computing, Proceeding of SAICSIT, pp. 141-148, (2002)
[5]
Borselius N., Mobile agent security, Electronics & Communication Engineering Journal, pp. 211-218, (2002)
[6]
Bouchemal N., Ramdane M., Zaidi S., CAP: Clone agent protocol to protect mobile agents, MASAUM Journal of Basic and Applied Sciences, 1, 1, (2009)
[7]
Chess D., Grosof B., Harrison C., Levine D., Parris C., Itinerant agents for mobile computing, IEEE Personal Communications, 2, 5, pp. 34-49, (1995)
[8]
Dhanalakshmi K., Kadhar Nawaz G.M., Matrix hop mobile agent (MHMA) system for e-service applications, International Conference on Communication Technology and System Design, (2011)
[9]
Esparza O., Fernandez M., Soriano M., Munoz J.L., Forne J., Mobile agent watermarking and fingerprinting: Tracing malicious hosts, Dexa, 2736, (2003)
[10]
Giovanni V., Protecting mobile agents through tracing, Proceedings of the Third ECOOP Workshop on Operating System Support for Mobile Object Systems, pp. 137-153, (1997)