Author of the publication

How to Play Sherlock Holmes in the World of Mobile Agents.

, , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 449-463. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Trust Policies for Protecting Mobile Agents Against DoS., and . POLICY, page 198-201. IEEE Computer Society, (2002)Improving and Extending the Lim/Lee Exponentiation Algorithm., , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 163-174. Springer, (1999)Denial of Service Detection in Mobile Agent Systems with Dependencies in Computations., and . Contributions to Ubiquitous Computing, volume 42 of Studies in Computational Intelligence, Springer, (2007)How to Play Sherlock Holmes in the World of Mobile Agents., , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 449-463. Springer, (2002)A Method for Protecting Mobile Agents against Denial of Service Attacks., and . CIA, volume 2446 of Lecture Notes in Computer Science, page 297-311. Springer, (2002)Bezahlen in der Virtuellen Universität., , , and . D-CSCL, page 261. Physica-Verlag / Springer, (2000)