-
1
-
-
30944448058
-
Mobile Agents for Secure Electronic Commerce Transactions with Privacy Protection of the Customers
-
ISBN: 0-7695-2274-2
-
C. Wang, H. Leung. "Mobile Agents for Secure Electronic Commerce Transactions with Privacy Protection of the Customers" Proceedings of the IEEE International Conference on e-Technology, e-Commeree, and e-Service, pp. 530-535, ISBN: 0-7695-2274-2, 2005
-
(2005)
Proceedings of the IEEE International Conference on e-Technology, e-Commeree, and e-Service
, pp. 530-535
-
-
Wang, C.1
Leung, H.2
-
2
-
-
46749129636
-
Securing Mobile Agents for Electronic Commerce: An Experiment
-
ISBN: 0-7923-7914-4
-
A. Chan, C. Wong, T. Wong, M. Lyu. "Securing Mobile Agents for Electronic Commerce: An Experiment", IFIP Conference Proceedings, vol. 175, pp. 471-480, ISBN: 0-7923-7914-4, 2000
-
(2000)
IFIP Conference Proceedings
, vol.175
, pp. 471-480
-
-
Chan, A.1
Wong, C.2
Wong, T.3
Lyu, M.4
-
3
-
-
0036497706
-
A Mobile Agent-Based Active Network Architecture for Intelligent Network Control
-
ISSN:0020-0255, March
-
W-S. Chen, C-L. Hu. "A Mobile Agent-Based Active Network Architecture for Intelligent Network Control". Information Sciences-Informatics and Computer Science: An International Journal, vol.141, pp. 3-35, ISSN:0020-0255, March 2002
-
(2002)
Information Sciences-Informatics and Computer Science: An International Journal
, vol.141
, pp. 3-35
-
-
Chen, W.-S.1
C-L, H.2
-
4
-
-
34548161907
-
Mobile Agent Facility Specification
-
August, URL
-
International Business Machines Corporation: "Mobile Agent Facility Specification". OMG TC Document cf/96-08-01, August 1996, URL: http://www.trl.ibm.co.jp/aglets/maf.ps
-
(1996)
OMG TC Document cf/96-08-01
-
-
-
7
-
-
84976834054
-
Authentication in Distributed Systems: Theory and Practice
-
November
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. "Authentication in Distributed Systems: Theory and Practice". ACM Transactions on Computer Systems, 10:265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
10
-
-
46749150879
-
-
D. Alexander, P. Menage, A. Keromytis. The price of Safety in an Active Network. SIOCOMM '99
-
D. Alexander, P. Menage, A. Keromytis. "The price of Safety in an Active Network". SIOCOMM '99
-
-
-
-
13
-
-
0004198635
-
-
ISBN-10:, ISBN-13: 978-0-13-035548-5. Prentice Hall. Published: 02 December, Upper Saddle River, NJ: Prentice Hall
-
Charles P. Pfleeger and Shari Lawrence Pfleeger. "Security in Computing". ISBN-10: 0-13-035548-8; ISBN-13: 978-0-13-035548-5. Prentice Hall. Published: 02 December 2002. Upper Saddle River, NJ: Prentice Hall
-
(2002)
Security in Computing
-
-
Pfleeger, C.P.1
Lawrence Pfleeger, S.2
-
16
-
-
34548176551
-
Agent Tel. Itinerant Agents: Explanations and Examples with CDROM
-
Zypa editors, Manning Publishing and Prentice Hall
-
Robert S. Gray, George Cybenko, David Kotz, and Daniela Rus. "Agent Tel. Itinerant Agents: Explanations and Examples with CDROM. William Cockayne and Michael Zypa (editors), Manning Publishing and Prentice Hall, 1997
-
(1997)
William Cockayne and Michael
-
-
Gray, R.S.1
Cybenko, G.2
Kotz, D.3
Rus, D.4
-
17
-
-
46149151346
-
Programming and Deploying Java Mobile Agents with Aglets
-
August
-
D. Lange and O. Mitsuru. "Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley Pub Co, ISBM: 0-201-32582-9, August 1998
-
(1998)
Addison-Wesley Pub Co, ISBM
-
-
Lange, D.1
Mitsuru, O.2
-
18
-
-
0002992633
-
D'Agents: Security in a multiple-language, mobile-agent system
-
Mobile Agents and Security, Giovanni Vigna Editor, Springer Verlag, pp
-
Robert S. Gray, David Kotz, George Cybenko, and Daniela Rus. "D'Agents: Security in a multiple-language, mobile-agent system", In Mobile Agents and Security, Giovanni Vigna (Editor), Lecture Notes in Computer Science, Springer Verlag, pp. 154-187, 1998
-
(1998)
Lecture Notes in Computer Science
, pp. 154-187
-
-
Gray, R.S.1
Kotz, D.2
Cybenko, G.3
Rus, D.4
-
19
-
-
46749086930
-
-
Sun Microsystems. JDK 5.0 Documentation. Sun Microsystems, 2004, URL: http://java.sun.com/j2se/1.5.0/docs/
-
Sun Microsystems. "JDK 5.0 Documentation". Sun Microsystems, 2004, URL: http://java.sun.com/j2se/1.5.0/docs/
-
-
-
-
20
-
-
0038335724
-
Pickling State in the Java System
-
Fall
-
R. Riggs, J. Waldo, A. Wolrath, K. Bharat. "Pickling State in the Java System". Computing Systems, 9(4), pp. 313-329, Fall 1996
-
(1996)
Computing Systems
, vol.9
, Issue.4
, pp. 313-329
-
-
Riggs, R.1
Waldo, J.2
Wolrath, A.3
Bharat, K.4
-
21
-
-
46749129223
-
-
Pankaj Kumar. J2EE Security for Servlets, EJBs, and Web Services. ISBN-10: 0-13-140264-1; ISBN-13: 978-0-13-140264-5; Prentice Hall. Published: 04 September, 2003
-
Pankaj Kumar. "J2EE Security for Servlets, EJBs, and Web Services. ISBN-10: 0-13-140264-1; ISBN-13: 978-0-13-140264-5; Prentice Hall. Published: 04 September, 2003
-
-
-
-
23
-
-
34548162898
-
Secure Hash Standard (SHS)
-
Federal Information Processing Standards FIPS, Publication, August
-
Federal Information Processing Standards (FIPS). "Secure Hash Standard (SHS)". Publication 182-2, 01 August 2992
-
, vol.182 -2
, Issue.1
, pp. 2992
-
-
-
24
-
-
46749126451
-
-
Sun Microsystems. keytool - Key and Certificate Management Tool. Copyright 2001. http://java.sun.com/j2se/1.3/docs/tooldocs/win32/ keytool.html
-
Sun Microsystems. "keytool - Key and Certificate Management Tool". Copyright 2001. http://java.sun.com/j2se/1.3/docs/tooldocs/win32/ keytool.html
-
-
-
-
27
-
-
0037362952
-
Protecting Mobile Code in the Wild
-
March/April
-
John Zachary. "Protecting Mobile Code in the Wild", IEEE Computer Society. March/April 2003 (Vol. 7, No. 2) pp 78 - 82
-
(2003)
IEEE Computer Society
, vol.7
, Issue.2
, pp. 78-82
-
-
Zachary, J.1
-
28
-
-
46749111322
-
-
Sun Microsystems. Java Cryptography Extension. http://java.sun.com/products/jce/. Copyright 1994-2006 Sun Microsystems, Inc
-
Sun Microsystems. "Java Cryptography Extension". http://java.sun.com/products/jce/. Copyright 1994-2006 Sun Microsystems, Inc
-
-
-
|