6Daemen J,Rijmen V.The block cipher rijndael,smart card research and applications[A].Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,2000.288-296.
7Jansen W.Countermeasures for mobile agent security[J].Computer Communications,2000,13:1667-1676.
8Sander T,Tschudin C F.Protecting mobile agents against malicious hosts[A].Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1998.44-60.
9Collberg C,Thomborson C.Software watermarking:Models and dynamic embeddings[A].Proceedings of Symposium on Principles of Programming Languages[C].New York:ACM Press,1999.311-324.