참고문헌
- B.H. Tay and A.L. Ananda, 'A Survey of Remote.' Procedure calls,' Operating Systems Review, vol. 24, No.3, pp.68-79, July 1990 https://doi.org/10.1145/382244.382832
- W. Farmer, J. Guttman, and V. Swarup, 'security for mobile agents: Authentication and state appraisal,' the European Symposium on Research in Computer Security(ESORICS), Lecture Notes in Computer Science, September 1996 https://doi.org/10.1007/3-540-61770-1_31
- W. Farmer, J. Guttman, and V. Swarup, 'Security for mobile agents: Issues and requirements.' National Information Systems Security Conference, National Institute of Standards and Technology, October 1996
- G. Karjoth, D. B. Lange. and M. Oshima, 'A Security Model for Aglets,' IEEE Internet Computing, Vol. 1, No.4, pp.68-77, July - August 1997 https://doi.org/10.1109/4236.612220
- H. Peine, 'Security Concepts and Implementation in the Ara Mobile Agent System,' 7th IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, Stanford University, USA, June 1998 https://doi.org/10.1109/ENABL.1998.725699
- R. Gray, 'Agent Tel: A flexible and secure mobile agent system,' In Proceedings of the Fourth Annual Tcl/Tk Workshop, Monterey, Cal., pp.9-23, July 1996
- John K. Ousterhout, Jacob Y. Levy. and Brent B. Welch, 'The Safe-Tel Security Model,' TR-97-60, March 1997
- T. Sander and Chr. Tschudin, 'Towards Mobile Cryptography,' the IEEE Symposium on Security and Privacy, 1998 https://doi.org/10.1109/SECPRI.1998.674837
- J. Baumann, F. Hohl, K Rothermel, and M. Strasser, 'Mole-Concepts of a mobile Agent System,' The World Wide Web Journal, special issue on Software Agents, 1998
- F. Hohl, 'Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts,' Mobile Agents and Security, Springer-Verlag, pp.99-113, 1998
- Douglas R. Stinson, 'Cryptography theory and practice,' pp233, CRC press, 1995
- Jusung Baek, 'A design of a protocol for detecting a mobile agent clone and its correctness proof using Coloured Petri Nets'. technical report TR-DIC-CSL-1998-002, Information and Communications, K -JIST, 1998
- Jusung Baek, R. S. Ramakrishna and Dong-Ik Lee, 'A design of a protocol for detecting an Agent clone in Mobile Agent Systems and its Correctness Proof', ACM Symposium on Principles of Distributed Computing, ACM press, pp. 269, May 1999 https://doi.org/10.1145/301308.301370
- Neil M. Haller, 'The S/KEY One-Time Password System,' Proceedings of the ISOC Symposium on Network and Distributed System Security, San Diego, CA, February 1994
- L.R. Knudsen, X. Lai, and B. Preneel, 'Attacks on fast double block length hash functions,' Journal of Cryptology, Vol 11, No.1, pp. 59-72, Winter 1998 https://doi.org/10.1007/s001459900035