共 50 条
- [2] Protecting the itinerary of mobile agents OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 301 - 301
- [3] Protecting mobile agent's computation results with reversible watermarking and digital signature 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 566 - 569
- [5] Protecting mobile agents by using traceability techniques ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, : 264 - 268
- [6] A hybrid method for protecting the integrity of mobile agents NEW ASPECTS OF TELECOMMUNICATIONS AND INFORMATICS, 2008, : 173 - 176
- [7] A Framework for Protecting Privacy on Mobile Social Networks Mobile Networks and Applications, 2021, 26 : 1281 - 1299
- [8] A Framework for Protecting Privacy on Mobile Social Networks MOBILE NETWORKS & APPLICATIONS, 2021, 26 (03): : 1281 - 1299
- [9] Gnafuy: a framework for ubiquitous mobile computation PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 810 - 813