Search
Now showing items 1-1 of 1
Protecting mobile agents against malicious hosts using trusted computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...