Safety checking of machine code
PLDI '00 Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation
Using interfaces to specify access rights
Secure Internet programming
Improving fault-tolerance by replicating agents
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2
Classification of malicious host threats in mobile agent computing
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
D'Agents: applications and performance of a mobile-agent system
Software—Practice & Experience - Special issue: Mobile agent systems
Software—Practice & Experience - Special issue: Mobile agent systems
Software—Practice & Experience - Special issue: Mobile agent systems
Fault-Tolerant Mobile Agent Execution
IEEE Transactions on Computers
MFCS '99 Proceedings of the 24th International Symposium on Mathematical Foundations of Computer Science
How to Play Sherlock Holmes in the World of Mobile Agents
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Detecting Manipulated Remote Call Streams
Proceedings of the 11th USENIX Security Symposium
Using Agent Replication to Enhance Reliability and Availability of Multi-agent Systems
AI '02 Proceedings of the 15th Conference of the Canadian Society for Computational Studies of Intelligence on Advances in Artificial Intelligence
A Method for Protecting Mobile Agents against Denial of Service Attacks
CIA '02 Proceedings of the 6th International Workshop on Cooperative Information Agents VI
Mobile Agent Security - Issues and Directions
IS&N '99 Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
Monotonicity and Partial Results Protection for Mobile Agents
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Applying Trust Policies for Protecting Mobile Agents Against DoS
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Architectural components for the efficient design of mobile agent systems
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
ACM Computing Surveys (CSUR)
Ethical design issues in cyberspace
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Automated Analysis of Fault-Tolerance in Distributed Systems
Formal Methods in System Design
Secure mobile agent system and its application in the trust building process of virtual enterprises
Multiagent and Grid Systems
Mobile Information Systems
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Secure message delivery in publish/subscribe networks using overlay multicast
International Journal of Security and Networks
The agent migration and fault-tolerance management in dynamic network security system
International Journal of Information Technology and Management
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
ODDUGI: Ubiquitous Mobile Agent System
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Performance analysis of mobile agent failure recovery in e-service applications
Computer Standards & Interfaces
Fault-models in wireless communication: towards survivable ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
The role of secret sharing in the distributed MARE protocols
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Countermeasures for mobile agent security
Computer Communications
Models For Dependable Computation with Multiple Inputs and Some Hardness Results
Fundamenta Informaticae
Hi-index | 0.00 |