共 55 条
[21]
Kauer B., 2007, SS 07 P 16 USENIX SE, P1
[22]
KRAXBERGER S, 2008, MOB 08 P 5 ANN INT C, P1, DOI DOI 10.4108/ICST.MOBIQUITOUS2008.3892
[23]
KRAXBERGER S, 2009, SECURE PEER TO PEER
[24]
Kraxberger S., 2009, IWCMC 09, P931, DOI DOI 10.1145/1582379.1582582
[25]
KURSAWE K, 2005, CRASH CRYPTOGRAPHIC
[26]
LI J, 2005, 2005 2 INT C MOB TEC, DOI DOI 10.1I09/MTAS.2005.243756
[27]
Lowe G., 1996, Tools and Algorithms for the Construction and Analysis of Systems. Second International Workshop, TACAS '96. Proceedings, P147
[28]
Software implementation for mobile agents in peer-to-peer-networks -: A case study
[J].
15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS,
2004,
:959-963
[29]
MACKER J, 2005, IEEE MIL COMM C 2005, V2, P883, DOI DOI 10.1109/MILCOM.2005.1605792
[30]
MARCHESINI J, 2003, EXPT TCPA TCG HARDWA