1 |
D. Milojicic et al., "MASIF: The OMG Mobile Agent System Interoperability Facility," Personal Technol., vol. 2, no. 2, Feb. 1998, pp. 117-129.
DOI
|
2 |
S.H. von Solms, "Electronic Commerce with Secure Intelligent Trade Agents," Comput. Security, vol. 17, no. 5, May 1998, pp. 435-446.
DOI
|
3 |
Y.-F. Chung et al., "An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce," Expert Syst. Appl., vol. 38, no. 8, Aug. 2011, pp. 9900-9907.
DOI
|
4 |
A.J.C. Trappey, C.V. Trappey, and F.T.L. Lin, "Automated Silicon Intellectual Property Trade Using Mobile Agent Technology," Robot. Comput.-Integr. Manuf., vol. 22, no. 3, July 2006, pp. 189-202.
DOI
|
5 |
G. Wang, T.N. Wong, and X.H. Wang, "A Hybrid Multi-agent Negotiation Protocol Supporting Agent Mobility in Virtual Enterprises," Inf. Sci., vol. 282, no. 20, Oct. 2014, pp. 1-14.
DOI
|
6 |
T.C. Du, E.Y. Li, and E. Wei, "Mobile Agents for a Brokering Service in the Electronic Marketplace," Decision Support Syst., vol. 39, no. 3, May 2005, pp. 371-383.
DOI
|
7 |
A. Aloui, O. Zerdoumi, and O. Kazar, "Architecture for Mobile Business Based on Mobile Agent," Multimedia Comput. Syst., Tangier, Morocco, May 10-12, 2012, pp. 954-958.
|
8 |
T.N. Wong and F. Fang, "A Multi-agent Protocol for Multilateral Negotiations in Supply Chain Management," Int. J. Production Res., vol. 48, no. 1, Jan. 2010, pp. 271-299.
DOI
|
9 |
S. Knight, S. Buffett, and P.C.K. Hung, "The International Journal of Information Security Special Issue on Privacy, Security and Trust Technologies and E-Business Services - Guest Editors' Introduction," Int. J. Inf. Security, vol. 6, no. 5, Sept. 2007, pp. 285-286.
DOI
|
10 |
Y. Jung et al., "A Survey of Security Issue in Multi-agent Systems," Artif. Intell. Rev., vol. 37, no. 3, Mar. 2012, pp. 239-260.
DOI
|
11 |
F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," in Mobile Agents Security, Berlin, Germany: Springer, 1998, pp. 92-113.
|
12 |
T. Sander and C. Tschudin, "Protecting Mobile Agents against Malicious Hosts," in Mobile Agents Security, Berlin, Germany: Springer, 1998, pp. 44-60.
|
13 |
P. Kotzanikolaou, M. Burmester, and V. Chrissikopoulos, "Secure Transactions with Mobile Agents in Hostile Environments," in Information Security Privacy, Berlin, Germany: Springer, 2000, pp. 289-297.
|
14 |
B. Lee, H. Kim, and K. Kim, "Secure Mobile Agent Using Strong Non-designated Proxy Signature," in Information Security Privacy, Berlin, Germany: Springer, 2001, pp. 474-486.
|
15 |
S. Han, E. Chang, and T. Dillon, "Secure E-Transactions Using Mobile Agents with Agent Broker," Int. Conf. Services Syst. Services Manag., Chongqing, China, June 13-15, 2005, pp. 849-855.
|
16 |
Y. Shi, L. Cao, and X. Wang, "A Security Scheme of Electronic Commerce for Mobile Agents Uses Undetachable Digital Signatures," Int. Conf. Inf. Security, Shanghai, China, Nov. 14-15, 2004, pp. 242-243.
|
17 |
Y. Shi et al., "Secure Mobile Agents in Electronic Commerce by Using Undetachable Signatures from Pairings," Int. Conf. Electron. Business,Beijing, China, Dec. 5-9, 2004, pp. 1038-1043.
|
18 |
Y. Shi and G.Y. Xiong, "An Undetachable Threshold Digital Signature Scheme Based on Conic Curves," Appl. Math. Inf. Sci., vol. 7, no. 2, Mar. 2013, pp. 823-828.
DOI
|
19 |
J. Yu et al., "Forward-Secure Identity-Based Signature: Security Notions and Construction," Inf. Sci., vol. 181, no. 3, Feb. 2011, pp. 648-660.
DOI
|
20 |
Y.-C. Yu, T.-Y. Huang, and T.-W. Hou, "Forward Secure Digital Signature for Electronic Medical Records," J. Med. Syst., vol. 36, no. 2, Apr. 2012, pp. 399-406.
DOI
|
21 |
C.-I. Fan, Y.-H. Lin, and R.-H. Hsu, "Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 4, Apr. 2013, pp. 672-680.
DOI
|
22 |
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," J. Cryptology, vol. 17, no. 4, Sept. 2004, pp. 297-319.
DOI
|
23 |
A. De Caro and V. Iovino, "JPBC: Java Pairing Based Cryptography," IEEE Symp. Comput. Commun., Kerkyra, Greece, June 28-July 1, 2011, pp. 850-855.
|
24 |
H. Krawczyk, "Simple Forward-Secure Signatures from Any Signature Scheme," ACM Conf. Comput. Commun. Security, Athens, Greece, Nov. 1-4, 2000, pp. 108-115.
|