共 50 条
[31]
A Novel Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack by ACK
[J].
ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS,
2008,
:612-616
[33]
Threats to the trust model of mobile agent platforms
[J].
ICSOFT 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL PL/DPS/KE,
2008,
:175-180
[34]
Identifying the Split Personality of the Malicious Host in the Mobile Agent Environment
[J].
2008 4TH INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2,
2008,
:623-627
[36]
Solutions for Security in Mobile Agent System
[J].
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012),
2014, 216
:103-110
[38]
A Security Strategy of Mobile Agent System
[J].
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3,
2013, 336-338
:2401-+