Secure Transactions with Mobile Agents in Hostile Environments.
Panayiotis KotzanikolaouMike BurmesterVassilios ChrissikopoulosPublished in: ACISP (2000)
Keyphrases
- mobile agents
- mobile agent system
- computing environments
- middleware architecture
- distributed systems
- mobile agent technology
- load balancing
- distributed computing
- distributed data mining
- fault tolerance
- client server
- network management
- agent technology
- mobile environments
- intelligent agents
- mobile computing
- group communication
- fault tolerant
- virtual enterprise
- fuzzy logic
- artificial neural networks
- information security
- database systems