-
1
-
-
0035917655
-
Mobile agents: an introduction
-
Gian P.P. Mobile agents: an introduction. Microprocessors and Microsystems 25 2 (2001) 65-74
-
(2001)
Microprocessors and Microsystems
, vol.25
, Issue.2
, pp. 65-74
-
-
Gian, P.P.1
-
2
-
-
33747586736
-
Protecting mobile-agent data collection against blocking attacks
-
Shao M.H., and Zhou J. Protecting mobile-agent data collection against blocking attacks. Computer Standards & Interfaces 28 5 (2006) 600-611
-
(2006)
Computer Standards & Interfaces
, vol.28
, Issue.5
, pp. 600-611
-
-
Shao, M.H.1
Zhou, J.2
-
3
-
-
33747812111
-
A timed mobile agent planning approach for distributed information retrieval in dynamic network environments
-
Baek J.W., and Yeom H.Y. A timed mobile agent planning approach for distributed information retrieval in dynamic network environments. Information Sciences 176 22 (2006) 3347-3378
-
(2006)
Information Sciences
, vol.176
, Issue.22
, pp. 3347-3378
-
-
Baek, J.W.1
Yeom, H.Y.2
-
4
-
-
33750514384
-
Mobile agents for information retrieval in hybrid simulation environment
-
Lu T., and Hsu C. Mobile agents for information retrieval in hybrid simulation environment. Journal of Network and Computer Applications 30 1 (2007) 244-264
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 244-264
-
-
Lu, T.1
Hsu, C.2
-
5
-
-
14844336430
-
A new reverse auction agent system for M-commerce using mobile agents
-
Shih D.H., Huang S.Y., and Yen D.C. A new reverse auction agent system for M-commerce using mobile agents. Computer Standards & Interfaces 27 4 (2005) 383-395
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.4
, pp. 383-395
-
-
Shih, D.H.1
Huang, S.Y.2
Yen, D.C.3
-
7
-
-
33746169048
-
Secure brokerage mechanisms for mobile electronic commerce
-
Esparza O., Muñoz J.L., Soriano M., and Forné J. Secure brokerage mechanisms for mobile electronic commerce. Computer Communications 29 12 (2006) 2308-2321
-
(2006)
Computer Communications
, vol.29
, Issue.12
, pp. 2308-2321
-
-
Esparza, O.1
Muñoz, J.L.2
Soriano, M.3
Forné, J.4
-
9
-
-
33646842835
-
HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems
-
Orgun B., and Vu J. HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems. Computers in Biology and Medicine 36 7-8 (2006) 817-836
-
(2006)
Computers in Biology and Medicine
, vol.36
, Issue.7-8
, pp. 817-836
-
-
Orgun, B.1
Vu, J.2
-
11
-
-
0032122780
-
Mobile software agents for telecommunications
-
Karmouch A. Mobile software agents for telecommunications. IEEE Communications Magazine 36 7 (1998) 24-25
-
(1998)
IEEE Communications Magazine
, vol.36
, Issue.7
, pp. 24-25
-
-
Karmouch, A.1
-
12
-
-
84964820465
-
Security issues in mobile agent technology
-
IEEE Computer Society Press, Cape Town, South Africa
-
Corradi A., Montanari R., and Stefanelli C. Security issues in mobile agent technology. Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '99) (1999), IEEE Computer Society Press, Cape Town, South Africa 3-8
-
(1999)
Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '99)
, pp. 3-8
-
-
Corradi, A.1
Montanari, R.2
Stefanelli, C.3
-
14
-
-
0032121340
-
Access control and key management for mobile agents
-
Volker R., and Mehrdad J.S. Access control and key management for mobile agents. Computers & Graphics (Pergamon) 22 4 (1998) 457-461
-
(1998)
Computers & Graphics (Pergamon)
, vol.22
, Issue.4
, pp. 457-461
-
-
Volker, R.1
Mehrdad, J.S.2
-
15
-
-
32644451622
-
A new solution for assigning cryptographic keys to control access in mobile agent environments
-
Chang C.C., and Lin I.C. A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6 1 (2006) 137-146
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.1
, pp. 137-146
-
-
Chang, C.C.1
Lin, I.C.2
-
16
-
-
85015402934
-
Use of elliptic curves in cryptography, advances in cryptology: proceedings of Crypto '85
-
Miller V.S. Use of elliptic curves in cryptography, advances in cryptology: proceedings of Crypto '85. Lecture Notes in Computer Science vol. 218 (1986) 417-426
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
17
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 48 177 (1987) 203-209
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
18
-
-
0348003132
-
The state of elliptic curve cryptography
-
Koblitz N., Menezes A., and Vanstone S.A. The state of elliptic curve cryptography. Designs, Codes and Cryptography 19 2-3 (2000) 173-193
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2-3
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.A.3
|