[1] 李旭晖, 吕慧, 向剑文, 等. 移动代理系统的安全问题[J]. 计算机应用, 2001, 21(7): 5-8. Li Xuhui, Lü Hui, Xiang Jianwen, et al. Security problem of mobile agent systems[J]. Computer Applications, 2001, 21(7): 5-8.
[2] 谷利泽, 李中献, 杨义先. 不需要可信任方的匿名代理签名方案[J]. 北京邮电大学学报, 2005, 28(1): 48-50. Gu Lize, Li Zhongxian, Yang Yixian. A anonymous proxy signature scheme without a trusted party[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(1): 48-50.
[3] Hohl F. Time limited blackbox security: protecting mobile agents against malicious hosts //Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1998: 92-113.
[4] Schelderup K, Lones J. Mobile agent security issues and directions// IS&N'99. Hamburg: Spring-Verlag, 1999: 157-167.
[5] 刘创, 邹华, 杨放春. 本地化代理——一种移动代理安全问题的解决方案. 北京邮电大学学报, 2000, 23(3): 59-63. Liu Chuang, Zou Hua, Yang Fangchun. Native agent——a solution to mobile agent security[J]. Journal of Beijing University of Posts and Telecommunications, 2000, 23(3): 59-63.
[6] Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature //Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2001: 474-486.
[7] 史扬, 王小平, 曹立明. 保护移动agent的电子交易安全方案[J]. 同济大学学报, 2004, 32(8): 1080-1082. Shi Yang, Wang Xiaoping, Cao Liming. Security scheme of electronic transactions for mobile agents[J]. Journal of Tongji University, 2004, 32(8): 1080-1082.
[8] Wang Changjie, Ho-fung L. Mobile agents for secure electronic commerce transactions with privacy protection of the customers// The 2005 IEEE International Conference on EEE05. : IEEE, 2005: 530-535.
[9] Schneier B. Applied cryptography [M] . 2nd ed. New York: John Wiley & Sons, 1996.
[10] Kotzanikolaous P, Burmester M, Chrissikopoulos V. Secure transactions with mobile agents in hostile environments//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2000: 289-297. |