王汝传,郑晓燕.移动代理技术及其在电子商务中的应用研究.南京邮电学院学报,2001,21(2):80-81. [2]Fritz Hohl. A protocol to detect malicious hosts attacks by using reference states. Technical Report Nr.09/99, Faculty of Informatics, University of Stuttgart, Germany, 1999.[3]Giovanni Vigna. Cryptographic Traces for Mobile Agents, Mobile Agents and Security, Berlin:Springer-Verlag, 1998, LNCS 1419: 137-153. [4]Fritz Hohl. Time Limited Blackbox Security: Protecting mobile agents from malicious hosts,Mobile Agents and Security, Berlin: Springer-Verlag, 1998, LNCS 1419: 92-113. [5]UWE G. Wilhelm, Sebastian M. Staamann, Levente Buttyan. A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing, 2000, 4(5): 40-48. [6]Dierks T, Allen C. The TLS Protocol. IETF, January 1999. [7]陈鲁生,沈世镒.现代密码学.北京:科学出版社,2002:53-66. [8]赖溪松,韩亮,张真诚.计算机密码学及其应用.北京:国防工业出版社,2001:84-106. [9]Garms J,Somerfield D.Java安全性编程指南.北京:电子工业出版社,2002:48-272. [10]Sander T, Tschudin C F. Towards mobile cryptography. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1998: 215-224. [11]张云勇.移动agent及其应用.北京:清华大学出版社,2002:46-53.
|