Wang X F.[J].Yi X, Lam K Y. Secure information agent for internet trading. 11th Australian Joint Conference on Artificial Intelligence98. Vol. 1, No.544, Brisban, Australia: Springer- Verlag Publishers.1998,:-[2]Ye Yiming, Yi Xun. Coalition signature scheme in multi-agent system. 11th International World Wide Web Conference, Honolulu,Hawaii, USA, 7 - 11 May, 2002:96 - 102.[3]Chaum D.[J].van Heyst E. Group signatures. In D.W. Davies, editor,Proc. of Eurocrypt91, vol. 547 of LNCS, Springer-Verlag.1992,:-[4]Bresson E.[J].Stern J, Szydlo M. Threshold ring signature for ad-hoc groups, Advances in Cryptology-Proceedings of CRYPTO02,Santa Barbara, California, USA. August 18.2002,22:-[5]赖溪松,韩亮,张真诚著,张玉清,肖国镇改编.计算机密码学及其应用.北京:国防工业出版社,2001:第21章,196-199.[6]Roth V. Mutual protection of cooperating agents. In Jan Vitek and Christian Jensen, Editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, vol. 1603 of Lecture Notes in Computer Science, 1997:275 - 285.[7]Dorigo M, Maniezzo V, Colorni A. The ant system: optimization by a colony of cooperating agents[J].IEEE Trans. on Systems, Man,and Cybernetics-PartB.1996, 26(1):29-[8]Mitrovic N, Arronategui U. Mobile agent security using proxyagents and trusted domains. Second International Workshop on Security of Mobile Multi-agent Systems (SEMAS 2002), Bologna,Italy, July 2002:81 - 83.[9]Sander T, Tschudin C. Protecting mobile agents against malicious hosts. Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science. No. 1419, 1998:44 - 60.[10]张云勇.移动Agent及其应用.北京:清华大学出版社,2002,第4章,28-35.
|