Computer Science ›› 2006, Vol. 33 ›› Issue (12): 78-80.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: As a new distributed computing technology, mobile agent has a wide application prospect. But in current mobile agent systems, malicious hosts problem, namely protection of mobile agent against malicious hosts is a tough problem. To better understand this

Key words: Mobile agent, Attack model, Distributed computing

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!