A mobile transaction model that captures both the data and movement behavior
Mobile Networks and Applications
Delegating remote operation execution in a mobile computing environment
Mobile Networks and Applications - Special issue on mobile computing and system services
Using a coordination language to specify and analyze systems containing mobile components
ACM Transactions on Software Engineering and Methodology (TOSEM)
ACM Computing Surveys (CSUR)
Mutual protection of co-operating agents
Secure Internet programming
Introducing trusted third parties to the mobile agent paradigm
Secure Internet programming
Cryptographic support for fault-tolerant distributed computing
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Personalizing information gathering for mobile database clients
Proceedings of the 2002 ACM symposium on Applied computing
Classification of malicious host threats in mobile agent computing
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Supporting personal mobility for nomadic computing over the internet
ACM SIGMOBILE Mobile Computing and Communications Review
Analysis of integration models for service composition
WOSP '02 Proceedings of the 3rd international workshop on Software and performance
Software—Practice & Experience - Special issue: Mobile agent systems
A Pessimistic Approach to Trust in Mobile Agent Platforms
IEEE Internet Computing
Mobile agents as a middleware for data dissemination
Neural, Parallel & Scientific Computations
Agent Tcl: Targeting the Needs of Mobile Computers
IEEE Internet Computing
IEEE Internet Computing
Fault-Tolerant Mobile Agent Execution
IEEE Transactions on Computers
Towards an Agent-Based Distributed Hierarchical Network Management System for All-Optical Networks
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
Providing Fine-grained Access Control for Java Programs
ECOOP '99 Proceedings of the 13th European Conference on Object-Oriented Programming
Protecting General Flexible Itineraries of Mobile Agents
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Networking in a Service Platform Based on Mobile Agents
ICN '01 Proceedings of the First International Conference on Networking-Part 2
Mobile Agent Security - Issues and Directions
IS&N '99 Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market
Authentication for Mobile Agents
Mobile Agents and Security
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
Mobile Agents and Security
Optimal distribution of a hierarchy of network management agents
Information Sciences—Informatics and Computer Science: An International Journal
Coordination technologies for internet agents
Nordic Journal of Computing
Mobile Agent Security and Telescript
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Brute force web search for wireless devices using mobile agents
Journal of Systems and Software
Optimized Dissemination of Highly Anticipated Content over an Itinerary Based P2P Network
ANSS '04 Proceedings of the 37th annual symposium on Simulation
Web customization using behavior-based remote executing agents
Proceedings of the 13th international conference on World Wide Web
Practical server privacy with secure coprocessors
IBM Systems Journal - End-to-end security
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
ACM Computing Surveys (CSUR)
Secure mobile agent system and its application in the trust building process of virtual enterprises
Multiagent and Grid Systems
An agent-based approach to intrastream synchronization for multimedia applications
International Journal of Knowledge-based and Intelligent Engineering Systems
A mobile agent protected scheme using pairing-based cryptosystems
International Journal of Mobile Communications
MAISim: mobile agent malware simulator
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Anonymity Architecture for Mobile Agent Systems
HoloMAS '07 Proceedings of the 3rd international conference on Industrial Applications of Holonic and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing
Efficient migration access control for mobile agents
Computer Standards & Interfaces
Efficient key management scheme for hierarchical access control in mobile agents
WSEAS TRANSACTIONS on COMMUNICATIONS
A novel key management and access control scheme for mobile agent
ICIC'06 Proceedings of the 2006 international conference on Intelligent computing: Part II
Constructing secure mobile-agent-based consumer electronic applications
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
The benefits of using mobile agents in distributed environments
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
A new approach to fault-tolerant mobile agent execution in distributed systems
EC'05 Proceedings of the 6th WSEAS international conference on Evolutionary computing
A new approach for evaluation fault-tolerant mobile agent execution in distributed systems
EC'05 Proceedings of the 6th WSEAS international conference on Evolutionary computing
A new approach for evaluation fault-tolerant mobile agent execution in distributed systems
EC'05 Proceedings of the 6th WSEAS international conference on Evolutionary computing
Using mobile agents to implement flexible network management strategies
Computer Communications
Countermeasures for mobile agent security
Computer Communications
Intrusion detection with mobile agents
Computer Communications
Agent Driven Delay and Power Constrained Multicast Routing in Mobile Ad Hoc Networks by Using ANFIS
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |