CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack.
Velik BelleminTadashi AraragiPublished in: DepCoS-RELCOMEX (2006)
Keyphrases
- mobile agents
- interaction protocols
- agent systems
- malicious users
- malicious nodes
- agent technology
- network nodes
- client server
- intelligent agents
- distributed computing
- multi agent systems
- load balancing
- fault tolerance
- distributed systems
- mobile agent technology
- computing environments
- multi agent
- distributed data mining
- multiagent systems
- agent communication
- ip addresses
- mobile agent system
- mobile computing
- ddos attacks
- black hole
- data mining