6Torsten I,Frank K. Migration of mobile agents in Java:problems,classification and solutions [A].proc of MA'2000[C].Australia.
二级参考文献36
1Loureiro S. Mobile Code Protection. These presentee pour obtenir le grade de docteur, de l'Ecole Nationale Superieure, des Telecommunications, Jan 26, 2001
2Jansen W, Karygiannis T. Mobile Agent Security. In: NIST special publication 800-19
3Necular G C, Lee P. Proof-Carrying Code: [Technical Report CMU-CS-96-165]. School of Computer Science, Carnegie Mellon University, Sep. 1996
4Lee P, Necular G. Research on Proof-Carrying Code for MobileCode Security. A position paper in DARPA Workshop on Foundations for Secure Mobile Code, March 1997.26~28
5Feigenbaum J, Lee P. Trust Management and Proof-Carrying Code in Secure Mobile-Code Applications. A position paper in DARPA Workshop on Foundations for Secure Mobile Code,March 1997.26~28
6Gong L,Proc.USENIX Symposium on Internet Technologies and Systems,1997年
7Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996. 8,143 (4):250-256.
8Bender W, Gruhl D, Morlmoto N et al, Techniques for data hiding. IBM System Journal, 1996,35(3&4):313-336.
9Kobayashi. Digital watermarking:Historical roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
10Voyatzis G, Nikolaidis N, Pitas 1. Digital watermarking: An overview. In:9th European Signal Processing Conference.Island of Rhodes,Greece. 1998:9-12