Security enhanced mobile agents
Proceedings of the 7th ACM conference on Computer and communications security
Mutual protection of co-operating agents
Secure Internet programming
Secure Data Collection with Updates
Electronic Commerce Research - Special issue on agents in electronic commerce
Software—Practice & Experience - Special issue: Mobile agent systems
ACM Transactions on Internet Technology (TOIT)
Implementation of Secure Architectures for Mobile Agents in MARISM-A
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
How to Play Sherlock Holmes in the World of Mobile Agents
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Defenses against the Truncation of Computation Results of Free-Roaming Agents
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Protecting General Flexible Itineraries of Mobile Agents
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Role-Based Access Control for E-commerce Sea-of-Data Applications
ISC '02 Proceedings of the 5th International Conference on Information Security
Protecting Mobile Code in the Wild
IEEE Internet Computing
Security Mechanisms for Using Mobile Agents in Electronic Commerce
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Security Requirements for Management Systems Using Mobile Agents
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Monotonicity and Partial Results Protection for Mobile Agents
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
A configurable mobile agent data protection protocol
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Proceedings of the 2003 workshop on New security paradigms
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
ACM Computing Surveys (CSUR)
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Secure Integration of Distributed Medical Data Using Mobile Agents
IEEE Intelligent Systems
Secure mobile agent system and its application in the trust building process of virtual enterprises
Multiagent and Grid Systems
Protecting free-roaming mobile agent against multiple colluded truncation attacks
Proceedings of the 3rd international conference on Mobile multimedia communications
One-Way Signature Chaining: a new paradigm for group cryptosystems
International Journal of Information and Computer Security
Anonymity Architecture for Mobile Agent Systems
HoloMAS '07 Proceedings of the 3rd international conference on Industrial Applications of Holonic and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Free-roaming mobile agent (FRoMA) protection against multiple attacks
International Journal of Communication Networks and Distributed Systems
Mobile agent watermarking (MAW): security properties and attacks revisited
Proceedings of the 7th International Conference on Frontiers of Information Technology
Using “fair forfeit” to prevent truncation attacks on mobile agents
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A novel method to maintain privacy in mobile agent applications
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Secure mediation with mobile code
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Countermeasures for mobile agent security
Computer Communications
Intrusion detection with mobile agents
Computer Communications
Reducing the computational cost of certification path validation in mobile payment
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |