Computer Science ›› 2006, Vol. 33 ›› Issue (12): 78-80.
Previous Articles Next Articles
Online:
Published:
Abstract: As a new distributed computing technology, mobile agent has a wide application prospect. But in current mobile agent systems, malicious hosts problem, namely protection of mobile agent against malicious hosts is a tough problem. To better understand this
Key words: Mobile agent, Attack model, Distributed computing
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I12/78
Cited