[1]
|
J. Zhu and J. Ma, “A New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, 2004, pp. 231-235.
|
[2]
|
W. A. Arbaugh, “Wireless Security Is Different,” Magazine of IEEE Computer Society, Computer, Vol. 36, No. 8, 2003, pp. 99-101. http://dx.doi.org/10.1109/MC.2003.1220591
|
[3]
|
H. Yang, F. Ricciato, L. Songwu and L. Zhang, “Securing a wireless world,” The Proceedings of IEEE, Vol. 94, No. 2, 2006, pp. 442-454. http://dx.doi.org/10.1109/JPROC.2005.862321
|
[4]
|
S. P. Alampalayam and A. Kumar, “An Adaptive Security Model for Mobile Agents in Wireless Networks,” IEEE Global Telecommunications Conference, Newark, 1-5 December 2003, pp. 1516-1521.
|
[5]
|
L. Vasiu and Q. H. Mahmoud, “Mobile agents in Wire-less Devices,” Magazine of IEEE Computer Society, Computer, 2004, Vol. 37, No. 2, pp. 104-105. http://dx.doi.org/10.1109/MC.2004.1266304
|
[6]
|
W. Arbaugh, N. Shankar, Y. Wan and K. Zhang, “Your 802.11 Wireless Network Has No Clothes,” IEEE Wire-less Communication, Vol. 9, No. 6, 2002, pp. 44-51. http://dx.doi.org/10.1109/MWC.2002.1160080
|
[7]
|
A. Karnik and K. Passerini, “Wireless Network Security—A Discussion from a Business Perspective,” Proceedings of IEEE Wireless Telecommunications Symposium, Nicosia, April 2005, pp. 261-267.
|
[8]
|
A. Mishra and W. A. Arbaugh, “An Initial Security Analysis of the IEEE 802.1× Standard,” Report No CS-TR-4328, 2002. http://www.cs.umd.edu/~waa/1x.pdf
|
[9]
|
J. White, “Mobile Agents White Paper,” General Magic, Inc., 1996. http://citeseer.ist.psu.edu/white96mobile.html
|
[10]
|
D. Lange and M. Oshima, “Seven Good Reasons for Mobile Agents,” Communications of ACM, 1999, Vol. 42, No. 3, pp. 88-89. http://dx.doi.org/10.1145/295685.298136
|
[11]
|
A. Corradi, R. Montanari and C. Stefanelli, “Security No.s in Mobile Agent Technology,” Proceedings of 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS’99), Cape Town, December 1999, pp. 3-8.
|
[12]
|
N. Borselius, “Mobile Agent Security”, Electronics and Communication Engineering Journal, Vol. 4, No. 5, 2002, pp. 211-218. http://dx.doi.org/10.1049/ecej:20020504
|
[13]
|
H. Aouadi and M. B. Ahamed, “Modile Agents Security,” 2nd International Conference on Mobile Technology, Applications and Systems, Guangzhou, November 2005, pp. 1-6.
|
[14]
|
Y. Wang, C. Wang and L. Cheng-Horng, “Mobile Agent Protection and Verification in the Internet Environment,” Proceedings of 4th International Conference on Computer and Information Technology, Wuhan, September 2004, pp. 482-487,
|
[15]
|
N. Aboudagga, M. T. Refaei, M. Eltoweissy, L. A. Dasilva and J. Quisquater, “Authentication Protocols for Ad Hoc Networks: Taxonomy and Research No.s,” Proceedings of 1st ACM International Workshop on QoS and Security in Wireless and Mobile Networks, Montreal, October 2005, pp. 96-104.
|