1Venkat N. Gudivada Information Retrieval on the World Wide Web[J].IEEE. Internet Computing,Sep. Oct 1997:58-68.
2Schneier,B.Applied Cryptography Second Edition[M].protocols,algorithms,and source code in C.1996.
3Tomas Sander and Christian F.Tschudin.Mobile Agents and Security,Protecting Mobile Agents Against Malicious Hosts[C].Springer-Verlag,Lecture Notes in Computer Science #1419,1998,6
4Hsieh-Chang Tu, Jieh Hsiang. An architecture and category knowledge for intelligent information retrieval agents. Decision Support Systems. 2000(28)
5Whitfield Diffie,Paul C. Oorschot,Michael J. Wiener. Authentication and authenticated key exchanges[J] 1992,Designs, Codes and Cryptography(2):107~125