王汝傳,鄭曉燕.移動代理技術(shù)及其在電子商務(wù)中的應(yīng)用研究.南京郵電學(xué)院學(xué)報,2001,21(2):80-81. [2]Fritz Hohl. A protocol to detect malicious hosts attacks by using reference states. Technical Report Nr.09/99, Faculty of Informatics, University of Stuttgart, Germany, 1999.[3]Giovanni Vigna. Cryptographic Traces for Mobile Agents, Mobile Agents and Security, Berlin:Springer-Verlag, 1998, LNCS 1419: 137-153. [4]Fritz Hohl. Time Limited Blackbox Security: Protecting mobile agents from malicious hosts,Mobile Agents and Security, Berlin: Springer-Verlag, 1998, LNCS 1419: 92-113. [5]UWE G. Wilhelm, Sebastian M. Staamann, Levente Buttyan. A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing, 2000, 4(5): 40-48. [6]Dierks T, Allen C. The TLS Protocol. IETF, January 1999. [7]陳魯生,沈世鎰.現(xiàn)代密碼學(xué).北京:科學(xué)出版社,2002:53-66. [8]賴溪松,韓亮,張真誠.計算機密碼學(xué)及其應(yīng)用.北京:國防工業(yè)出版社,2001:84-106. [9]Garms J,Somerfield D.Java安全性編程指南.北京:電子工業(yè)出版社,2002:48-272. [10]Sander T, Tschudin C F. Towards mobile cryptography. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1998: 215-224. [11]張云勇.移動agent及其應(yīng)用.北京:清華大學(xué)出版社,2002:46-53.
|