-
2
-
-
77957787468
-
An overview of security issues and techniques in mobile agents
-
In edited book by IFIP (International Federation for Information Processing), Springer Boston, 1571-5736 (Print) 1861-2288, October 2005
-
Alfalayleh, M., & Brankovic, L. (2005). An Overview of Security Issues and Techniques in Mobile Agents. In edited book by IFIP (International Federation for Information Processing), Communications and Multimedia Security, Springer Boston, 1571-5736 (Print) 1861-2288, October 2005.
-
(2005)
Communications and Multimedia Security
-
-
Alfalayleh, M.1
Brankovic, L.2
-
3
-
-
39749163072
-
Privacy and forensics investigation process: The ERPINA protocol
-
doi:10.1016/j.csi.2007.10.008
-
Antoniou, G., Sterling, L., Gritzalis, S., & Udaya, P. (2008). Privacy and forensics investigation process: The ERPINA Protocol. Computer Standards & Interfaces, 30(4), 229-236. doi:10.1016/j.csi.2007.10.008
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.4
, pp. 229-236
-
-
Antoniou, G.1
Sterling, L.2
Gritzalis, S.3
Udaya, P.4
-
4
-
-
77952490155
-
Security for mobile agents: Issues and challenges
-
In I. Mahgoub & M. Ilyas (Eds.), Boca Raton, FL: CRC Press
-
Bellavista, P., Corradi, A., Federici, C., Montanari, R., & Tibaldi, D. (2004). Security for Mobile Agents: Issues and Challenges. In I. Mahgoub & M. Ilyas (Eds.), Handbook of Mobile Computing. Boca Raton, FL: CRC Press.
-
(2004)
Handbook of Mobile Computing
-
-
Bellavista, P.1
Corradi, A.2
Federici, C.3
Montanari, R.4
Tibaldi, D.5
-
6
-
-
84937558604
-
Privacy incorporated software agent (PISA), proposal for building a privacy guardian for the electronic age
-
doi:10.1007/3-540-44702-4_8
-
Borking, J. J. (2009). Privacy Incorporated Software Agent (PISA), Proposal for Building a Privacy Guardian for the Electronic Age. Lecture Notes in Computer Science, 2009, 130. doi:10.1007/3-540-44702-4_8
-
(2009)
Lecture Notes in Computer Science, 2009
, pp. 130
-
-
Borking, J.J.1
-
8
-
-
84898143510
-
Computer security, privacy and politics: Current issues, challenges and solutions
-
In I. Lee (Ed.), Hershey, PA: IGI
-
Clarke, R. (2008). Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions. In I. Lee (Ed.), Electronic Business: Concepts, Methodologies, Tools, and Applications (Vol. 4). Hershey, PA: IGI.
-
(2008)
Electronic Business: Concepts, Methodologies, Tools, and Applications
, vol.4
-
-
Clarke, R.1
-
10
-
-
39749129337
-
Secure and auditable AgentBased E-marketplace framework for mobile users
-
doi:10.1016/j.csi.2007.10.009
-
Jailani, N., Yatim, N. F. M., Yahya, Y., Patel, A., & Othman, M. (2008). Secure and Auditable AgentBased E-marketplace Framework for Mobile Users. Computer Standards & Interfaces, 30(4), 237-252. doi:10.1016/j.csi.2007.10.009
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.4
, pp. 237-252
-
-
Jailani, N.1
Yatim, N.F.M.2
Yahya, Y.3
Patel, A.4
Othman, M.5
-
11
-
-
40949151220
-
A partial equilibrium view on security and privacy
-
Retrieved from
-
Katos, V., & Patel, A. (2008). A Partial Equilibrium View on Security and Privacy, Information Management and Computer Security, 16(1), 74-83. Retrieved from http://www.emeraldinsight.com/0968-5227.htm
-
(2008)
Information Management and Computer Security
, vol.16
, Issue.1
, pp. 74-83
-
-
Katos, V.1
Patel, A.2
-
12
-
-
31144445731
-
Technical challenges of network anonymity
-
doi:10.1016/j.comcom.2004.12.011
-
Kesdogan, D., & Palmer, C. (2006). Technical challenges of network anonymity. Computer Communications, 29(3), 306-324. doi:10.1016/j.comcom.2004.12.011
-
(2006)
Computer Communications
, vol.29
, Issue.3
, pp. 306-324
-
-
Kesdogan, D.1
Palmer, C.2
-
13
-
-
0030233817
-
Software agents: An overview
-
doi:10.1017/S026988890000789X
-
Nwana, H. S. (1996). Software Agents: An Overview. The Knowledge Engineering Review, 11(3), 1-40. doi:10.1017/S026988890000789X
-
(1996)
The Knowledge Engineering Review
, vol.11
, Issue.3
, pp. 1-40
-
-
Nwana, H.S.1
-
14
-
-
33745883087
-
-
Retrieved May 2009, from
-
Pfitzmann, A., & Hansen, M. (2009). Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology. Version 0.28. Retrieved May 2009, from http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
-
(2009)
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology. Version 0.28
-
-
Pfitzmann, A.1
Hansen, M.2
-
15
-
-
0242628243
-
Security and trust in agent-oriented middleware
-
January
-
Poggi, A., Tomaiuolo, M., & Vitaglione, G. (2003, January). Security and Trust in Agent-Oriented Middleware. Lecture Notes in Computer Science, 2889, 989.
-
(2003)
Lecture Notes in Computer Science
, vol.2889
, pp. 989
-
-
Poggi, A.1
Tomaiuolo, M.2
Vitaglione, G.3
-
16
-
-
56349100597
-
A secure agent platform for active RFID
-
Treytl, A., Spenger, W., & Riaz, B. (2008). A secure agent platform for active RFID. In Emerging Technologies and Factory Automation, 2008. ETFA 2008 (pp.492-495).
-
(2008)
Emerging Technologies and Factory Automation, 2008
, vol.2008
, pp. 492-495
-
-
Treytl, A.1
Spenger, W.2
Riaz, B.3
-
17
-
-
84972263711
-
Intelligent agents: Theory and practice
-
doi:10.1017/S0269888900008122
-
Wooldridge, M., & Jennings, N. R. (1995). Intelligent agents: Theory and practice. The Knowledge Engineering Review, 10(2), 115-152. doi:10.1017/S0269888900008122
-
(1995)
The Knowledge Engineering Review
, vol.10
, Issue.2
, pp. 115-152
-
-
Wooldridge, M.1
Jennings, N.R.2
-
18
-
-
77954769374
-
Security model of mobile agent in E-commerce
-
Zhang, D.-L., & Lin, C. (2005). Security Model of Mobile Agent in E-commerce. China Academic Journal Electronic Publishing House, 25(6), 1271-1273.
-
(2005)
China Academic Journal Electronic Publishing House
, vol.25
, Issue.6
, pp. 1271-1273
-
-
Zhang, D.-L.1
Lin, C.2
|