4Farmer W,,Guttman J,Swarup V.Security forMobile Agents.Autenti2cation and State App raisal. Computer Security ES-ORICS‘96 . 1996
5Mc Ilraith S,Amir E.Theorem Proving with Structured Theories. Proceedings of the Seventeenth International Conference on Artifi-cial Intelligence . 2001