StratOSphere: mobile processing of distributed objects in Java
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mobility and Extensibility in the StratOSphere Framework
Distributed and Parallel Databases - Special issue on mobile data management and applications
Trust: benefits, models, and mechanisms
Secure Internet programming
Certificates for mobile code security
Proceedings of the 2002 ACM symposium on Applied computing
Classification of malicious host threats in mobile agent computing
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Mole – Concepts of a mobile agent system
World Wide Web
Wrappers-a mechanism to support state-based authorisation in Web applications
Data & Knowledge Engineering - Data and applications security
Protecting Mobile Web-Commerce Agents with Smartcards
Autonomous Agents and Multi-Agent Systems
ACM Transactions on Internet Technology (TOIT)
Applying Mobile Agents to Enable Dynamic, Context-Aware Interaction for Mobile Phone Users
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Secure Client Agent Environment (SCAE) for World Wide Web
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Crawlets: Agents for High Performance Web Search Engines
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Authentication for Mobile Agents
Mobile Agents and Security
Security Mechanisms for Using Mobile Agents in Electronic Commerce
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Monotonicity and Partial Results Protection for Mobile Agents
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
A buddy model of security for mobile agent communities operating in pervasive scenarios
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
A Secure Mobile Agent System Model Based on Extended Elementary Object System
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
ACM Computing Surveys (CSUR)
A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Communication and security extensions for a ubiquitous mobile agent system (UbiMAS)
Proceedings of the 2nd conference on Computing frontiers
Secure agent computation: X.509 proxy certificates in a multi-lingual agent framework
Journal of Systems and Software - Special issue: Software engineering education and training
A secure modular mobile agent system
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems
The reflective mobile agent paradigm implemented in a smart office environment
Personal and Ubiquitous Computing
Secure mobile agent system and its application in the trust building process of virtual enterprises
Multiagent and Grid Systems
Future Generation Computer Systems
Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection
International Journal of Electronic Commerce
Security: important issue in e-commerce
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
Trust-enhanced secure mobile agent-based system design
International Journal of Agent-Oriented Software Engineering
A pairing-based authentication scheme for protecting multiple mobile agent hosts
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
SMASH: Modular Security for Mobile Agents
Software Engineering for Multi-Agent Systems V
Secure multiple-times proxy signature scheme
Computer Standards & Interfaces
Efficient migration access control for mobile agents
Computer Standards & Interfaces
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
Study of MA protection technology of extending inheritance hierarchy trees in IDC network management
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
Outdoor distributed computing with split smart messages
Proceedings of the 12th Monterey conference on Reliable systems on unreliable networked platforms
A Mobile Agent-Based Tool Supporting Web Services Testing
Wireless Personal Communications: An International Journal
Security threats to mobile agents
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Multi-platform agent systems with dynamic reputation policy management
AI*IA'11 Proceedings of the 12th international conference on Artificial intelligence around man and beyond
SECMAP: a secure mobile agent platform
CEEMAS'05 Proceedings of the 4th international Central and Eastern European conference on Multi-Agent Systems and Applications
A survey of security in multi-agent systems
Expert Systems with Applications: An International Journal
Support of reflective mobile agents in a smart office environment
ARCS'05 Proceedings of the 18th international conference on Architecture of Computing Systems conference on Systems Aspects in Organic and Pervasive Computing
A novel and secure non-designated proxy signature scheme for mobile agents
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
A survey of security issue in multi-agent systems
Artificial Intelligence Review
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Countermeasures for mobile agent security
Computer Communications
Self-reliant mobile code: a new direction of agent security
Journal of Network and Computer Applications
Hi-index | 0.00 |