Monickaraj Vigilson Prem and Sankaranarayanan Swamynathan


  1. [1] Z. Shen and X. Wu, A trusted computing technology enabledmobile agent system, Proc. Int. Conf. on Computer Scienceand Software Engineering, Wuhan, Hubei, 2008, 567–570.
  2. [2] M. Vigilson Prem and S. Swamynathan, Role of mobile agentin medical information retrieval in mass casualty scene – Aperformance study in web environment, WSEAS Transactionson Information Science and Applications, 8(10), 2011, 407–416.
  3. [3] D. Foster and V. Varatharajan, Trust-enhanced secure mobileagent-based system design, International Journal of Agent-Oriented Software Engineering, 1(2), 2007, 205–224.
  4. [4] N. Lukasz, P. Marcin, and R. Michal, Mobile agent security, inJ. Thomas (ed.), Information assurance and computer security.(IOS press, 2006), 102–123.
  5. [5] F.T. Ibharalu, A.B. Sofoluwe, and A.T. Akinwale, A reliableprotection architecture for mobile agents in open networksystem, International Journal of Computer Applications, 17(7),2011, 6–14.
  6. [6] J.M. Gnanasekar and V. Ramachandran, Distributed crypto-graphic key management for mobile agent security, Interna-tional Journal of Recent Trends in Engineering, 1(1), 2009,164–167.
  7. [7] N. Pahal, S. Kumar, A. Bhardwaj, and N. Chauhan, Security onmobile agent based crawler, International Journal of ComputerApplications, 1(15), 2010, 5–11.
  8. [8] M.A. Tarig, Using secure-image mechanism to protect mobileagent against malicious host, World Academy of Science,Engineering and Technology, 59, 2009, 82–91.
  9. [9] A. Esfandi and A.M. Rahimabadi, Mobile agent security inmulti agent environment using a multi agent multi key ap-proach, Proc. 2nd IEEE Int. Conf. on Computer Science andInformation Technology, Beijing, China, 2009, 438–442.
  10. [10] M. Dnyaneshwar Rangnath, Mobile agent security-aglet plat-form, M.Tech. Thesis, Department of Computer Engineering,NIT Karnataka, Suratkal, India, 2010.
  11. [11] S. Venkatesan, C. Chellappan, T. Vengattaraman, P.Dhavachelvan, and Anurika Vaish, Advanced mobile agentsecurity models for code integrity and malicious availabilitycheck, Journal of Network and Computer Applications, 33(6),2010, 661–671.
  12. [12] P. Marikkannu, J.J. Adri Jovin, and T. Purushothaman, Asecure mobile agent system against tailgating attacks, Journalof Computer Science, 7(4), 2011, 488–492.
  13. [13] M. Vigilson Prem and S. Swamynathan, Reliable mobile agentin multi–region environment with fault tolerance for e-serviceapplications, Proc. Int. Conf. High-Performance Architectureand Grid Computing, Chandigarh, India, 2011, 199–207.
  14. [14] S. Srivastava and G.C. Nandi, Protection of mobile agent andits itinerary from malicious host, Proc. Int. Conf. Computerand Communication Technology, Allahabad, India, 2011,405–411.
  15. [15] R. Singh and M. Dave, Rescuing data of mobile agents blockedby malicious hosts in e-service applications, Proc. Int. Conf.Multimedia, Signal Processing and Communication Technolo-gies, Aligarh, India, 2011, 24–27.
  16. [16] S. Venkatesan and C. Chellappan, Identifying the split person-ality of the malicious host in the mobile agent environment,Proc. 4th Int. Conf. Intelligent Systems, Varna, Bulgaria, 2008,40–44.
  17. [17] R. Jha, Mobile agents for E-commerce, M.Tech. Thesis, KRSchool of Information Technology, Indian Institute of Technol-ogy, Bombay, India, 2001.
  18. [18] Z. Shen and Q. Tong, A security technology for mobile agentsystem improved by trusted computing platform, Proc. 9thInt. Conf. Hybrid Intelligent Systems, Shenyang, China, 2009,46–50.
  19. [19] F. Linna and L. Jun, A free-roaming mobile agent securityprotocol against colluded truncation attacks, Proc. Int. Conf.Education, Technology & Computer, Hunan, China, 2008,348–353.
  20. [20] Aglets – IBM,

Important Links:

Go Back