Abstract: This paper presents an evaluation of authentication mechanisms for mobile agents on top of a Java environment. In these mechanisms, the authentication of mobile agents is controlled by the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results