移动agent迁移技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着Internet的迅速发展,网络技术和分布式人工智能领域不断取得新的突破,传统的分布式计算模式已经不能满足当前异质网络上复杂的分布式计算要求,移动agent技术就是在这种情况下诞生的一种新的网络计算技术。移动agent具有自主性、协作性以及移动性,它可以代替用户去完成所需的任务,而且它能根据用户各种需求以及实际情况在网络中自主地迁移。这种模式非常适合分布式计算的要求,为分布式计算环境中合理、有效的组织信息,以及信息的访问和共享提供了新思路和新方案。移动agent所支持的计算模式克服了传统信息管理和共享方式的弊端,提高了分布式环境下信息共享和获取能力。移动agent最大的特点是其移动性,合理的迁移路径和迁移策略将使得移动agent的性能得到极大的改善。
     旅行agent问题是一种复杂的组合优化问题,目的在于解决移动agent在不同主机间移动时,如何搜索最优的迁移路径,它是移动agent迁移路径规划中最经典的问题。针对蚁群算法在解决此类问题时需要较长搜索时间和易于陷入局部极小等缺点,引入变异运算,并且对蚁群算法的全局和局部更新规则进行了改进,降低了蚁群算法求解旅行agent问题时,陷入局部极小而导致系统出现停滞现象的可能。仿真实验结果表明,改进的蚁群算法使得移动agent能够以更优的效率和更短的时间来完成任务。
     针对遗传算法、粒子群优化算法求解移动agent路径选择问题时,进入后期搜索效率较低等问题。对移动agent的路径选择问题进行形式化描述,给出该问题的多约束最优路径求解模型,根据模拟退火算法中的Metropolis准则接受最优单体以推动文化算法中信念空间的进化,提出了一种将模拟退火算法嵌入文化算法框架中来求解移动agent迁移路径选择的方法。仿真实验结果表明,应用文化算法求解移动agent迁移路径选择问题,具有较好的结果以及较低的运算代价。
     针对现有的移动agent迁移策略在迁移过程中不能为移动agent动态选择迁移主机的问题。结合支持向量机的相关原理,在已有移动agent规范和模型的基础上,改进了移动agent的模型,提出了基于支持向量机的移动agent迁移策略,并给出了相应的智能迁移模型。基于支持向量机的移动agent迁移策略,充分利用了支持向量机优异的学习能力以及分类性能,力图为移动agent规划出最佳迁移目的主机,缩短移动agent完成任务的时间。仿真实验结果表明,与一步迁移策略以及理想迁移策略相比,该策略能够以较大的概率获得最优解。
     移动agent的迁移安全是移动agent技术现阶段面临的主要安全问题之一。针对Domingo所提出的移动agent迁移协议不能防止恶意主机联合篡改移动agent迁移信息的安全问题。在此协议的基础上,利用hash函数,提出了一个基于Merkle树的移动agent动态安全迁移协议,并对其安全性和计算复杂度进行了详细的分析。相比已有的方案,基于Merkle树的移动agent动态安全迁移迁移协议在保证安全性的同时,计算复杂度得到了明显的降低。
With the development of Internet, network technology and distributed artificial intelligence field have continuously achieved new breakthrough. The traditional distributed computing model can not meet the demands of complex distributed computing on heterogeneous network. Based on theses studies, mobile agent technology which is a new network computing technology is proposed. Mobile agent has the character of autonomy, collaboration and mobility. Mobile agent can independently move in heterogeneous network and seek the appropriate computation resources. It will migrate from machine to machine and accomplish the specific task on behalf of the user. The model is fit for the demand of distributed computing. Mobile agent technology provides new thoughts and methods for the information organization, information high efficiency access and information sharing in distributed computing environment. The computing model of mobile agent can overcome the disadvantages of traditional information management and information sharing and improve the information sharing and acquisition capacity in distributed computing environment. The remarkable characteristic of mobile agent is mobility. Reasonable routing policy and routing planning will obviously improve the system performance of mobile agent.
     Traveling agent problem is a complex combinatorial optimization problem, which solves the problem of planning out an optimal migration path when agents migrate to several hosts. In this paper, an improved ant colony algorithm is presented. A mutation operator is introduced and the local and global updating rules of pheromone are modified on the basis of ant colony algorithm. The algorithm greatly decreases the possibility of halting the ant system due to arriving at local minimum. The simulation experiment results show that mobile agent can accomplish the computing task with high efficiency and short time.
     Aiming at genetic algorithm and particle swarm optimization has lower searching efficiency in solving route choice of mobile agent. The key idea behind cultural algorithm is to explicitly acquire problem-solving knowledge from the evolving population and in return apply that knowledge to guide the search. In this paper, routing problem of mobile agent is formally demonstrated; also solving model of Multi-Constrained non-dominated optimal route is presented. Cultural algorithm is designed to solve the problem of mobile agent's routing: accepting the best individuals to improve the evolution of belief space by simulated annealing, search step length as situational knowledge is used to guide searching of the optimal solution in population space. The simulation experiment shows that the algorithm produces highly competitive results at a relatively low computational cost.
     Aiming at the existed mobile agent migration strategy can not dynamically choose migration host for mobile agent. Based on the existing model and criterion of mobile agent, machine learning theory is combined with the correlation theory of support vector machine and the model of mobile agent is improved. Intelligent migration strategy and model of mobile agent based on support vector machine are proposed. Mobile agent with support vector machine can perceive the changes of environment, react immediately, embodying the reactivity and autonomy of agent. Compared with other migration strategies, it can obtain the optimal result with high probability. The simulation experiment results on Aglet platform show that the migration strategy is effective and available.
     Migration security is one of main security problem of mobile agent. In this paper, we analyze the existing effective migration protocol and point the protocol has serious security hidden trouble:it is not against collusion of malicious hosts. Based on this protocol, using hash function, a security itinerary protection of mobile agent based on Merkle trees is proposed. Security and computational complexity are discussed in detail. According to the existing protocol, improved protocol meets the demand of security. Computational complexity is reduced.
引文
[1]V. Vapnik. Statistical Learning Theory. Wiley, New York,1998
    [2]Vapnik V.The nature of statistical Learning Theory. Springer-Verlag,New York,1995
    [3]Corts C, Vapnik V. Support vector networks. Machine Learning,1995,
    [4]Hurakadli, J.M, Manvi, S.S, Mallapur, J.D. Agent based connectivity detection and routing in mobile ad-hoc networks.2006 3rd International IEEE Conference on Intelligent Systems (IEEE Cat. No.06EX1304),2006, 390-394P
    [5]石纯一,张伟,徐晋晖,等译.多Agent系统引论.北京,电子工业出版社,2003
    [6]张云勇,锦德.移动Agent技术.北京,清华大学出版社,2003
    [7]韩毅,李士宁.基于移动Agent的移动计算形式理论分析.无限通信技术,2001(4):49-52页
    [8]Puliafito A., Riccobene S., Scarpa M. An analytical comparison of the client-server, remote evaluation and mobile agent paradigms. Proceedings of the First Internationla Symposium on Agent Systems and Applications Third International Symposium of Mobile Agents. Palm Springs,1999, 278-292P
    [9]Gray R, Kotz D, etc. Mobile agents for mobile computing, Technical report PCS-TR96-285, Computer Science of Dartmouth College, May 2,2001.
    [10]吕玉海,徐学洲.移动Agent技术的发展.西安电子科技大学学报,2002,29(3):392-397页
    [11]魏竣,冯玉琳.移动计算形式理论分析与研究.计算机研究与发展,2000,1(37):129-139页
    [12]陶先平,吕建,张冠群.一种移动Agent结构化迁移机制的设计和实现.软件学报,2000(11):35-40页
    [13]F. M. T. Brazier, B. J. Overeinder, M. van Steen, and N. J. E. Wi jingaards. Agent Factory:Generative Migration of Mobile Agents in Heterogeneous Enviroments. ACM February 2002(2):221-226P
    [14]IBM Research Labs. Aglets Workbench:Programming Mobile Agents in Java,http://www.trl.ibm.co.jp/aglets,2002
    [15]Lange Danny B, Dridor Yariv. Agent Transfer Protocol. IBM Tokyo Research Laboratory, http://www.trl.ibm.co.jp/aglets,2004
    [16]A. Acharya, M Ranganatham, J Saltz. Sumatra:A language for resource aware mobile programs. In:J Vitek, C Tschudin eds. Proc of Mobile Object Systems:Towards the Programmable Internet. Berlin:Springer,1997, 111-130P
    [17]Daniela Rus, Robert Gray, David Kotz. Transportable Information Agents. Journal of Intelligent Informaiton Systems,1997,9(3):215-238P
    [18]Daniela RuS. A flexible and secure mobile-agent system, Ph.D Thesis, Computer Science of Dartmouth College, June,2001
    [19]Concordia. An Infrastructure for Collaborating Mobile Agents. In: Proceedings of the 1st International Workshop on Mobile Agents, April 2001
    [20]刘大有,杨博,杨鲲,王生生.基于旅行图的移动Agent迁移策略.计算研究与发展,2003,40(6):838-845页
    [21]张正球,章志明,余敏.基于迁移计划图的Agent迁移机制.计算机工程,2005,31(16):222-224页
    [22]A. Colorni, M. Dorigo, V. Maniezzo. Distributed optimization by ant colonies. In Proceedings of the European Conference on Artificial Life (ECAL'91, Paris, France), F. Varela and P. Bourgine (editors). Elsevier Publishing, Amsterdam,1991,134-142P
    [23]M. Dorigo, V. Maniezzo, A. Colorni. The ant system:optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics-Part B,1996,26(1):29-41P
    [24]M. Dorigo, G. Garo, L. Gambardella. Ant algorithm for discrete
    optimization. Artificial Life,1999,5(2):137-172P
    [25]M. Dorigo, L. Gambardella. Ant colony system:a cooperative learning approach to the Travelling Salesman Problem. IEEE Transactions on Evolutionary Computation,1997,1(1):53-66P
    [26]L. Gambardella, E. Tailard, M. Dorigo. Ant colonies for the Quadratic Assignment Problem. Journal of the Operational Research Society,1999, 50:167-176P
    [27]A. Colorni, M. Dorigo, V. Maniezzo. Ant syetem for Job-shop scheduling. Belgian Journal of Operations Research, Statistics and Computer Science, 1994,34(1):39-53P
    [28]刘建勋.移动Agent的安全性问题探讨.小型微型计算机系统,2000,21(12):1316-1319页
    [29]Bennet S Yee. A Sanctuary for Mobile Agents. In:Secure Internet Programming:Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science 1603. London:Springer-Verlag,1999, 261-276P
    [30]W. Farmer, J. Guttman, V. Swarup. Security for mobile agents: authentication and state appraisa. Proceedings of the Computer Security-ESORICS'96, Lecture Notes in Computer Science 1146. Berlin: Springer-Verlag,1996,118-130P
    [31]N. Asokan, C. Gulcu, G. Karjoth. Protecting the computation results of free-roaming agents. In:Proceedings of the 2rd International Work on Mobile Agents, Lecture Notes in Computer Science 1477. New York: Springer-Verlag,1998,195-207P
    [32]谭湘,顾毓清,包崇明.一种基于移动代理的数据保护机制.软件学报,2005,16(3):177-484页
    [33]Giovanni Vigna. Cryptographic Traces for Mobile Agents. In:Lecture Notes in Computer Science 1419. Heidelberg:Springer-Verlag,1998: 137-153P
    [34]V. Roth. Mutual protection of co-operating agents. In:J Vitek, C Jensen eds. Secure Internet Programming:Security Issues for Mobile and Distributed Objects. New York:Springer-Verlag1603,1999,275-285P
    [35]Dirk Westho, Markus Schneider, Clasu Unger. Methods for Protecting a Mobile Agent's Route. In:Lecture Notes in Computer Science 1729. Berlin: Springer-Verlag,1999,57-71P
    [36]Dirk Westho, Markus Schneider, Clasu Unger. Protecting a Mobile Agent's Route against Collusions. In:Lecture Notes in Computer Science 1758. Berlin:Springer-Verlag,2000,215-225P
    [37]柳毅,王育民.基于移动代理的一个鲁棒迁移协议.计算机研究与发展,2005,42(12):2106,2110页
    [38]曹大军,徐良贤,王勋.移动Agent框架的设计及其关键技术.计算机工程与应用,2002,1:164-166页
    [39]史忠植.智能主体及其应用.北京:科学出版社,2000
    [40]Harroud, H., Ahmed, M., Karmouch, A., Gray, T., Impey, R. Agent-based personalized services in a mobile computing environment.2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233),2001(2):728-31P
    [41]Corradi A. Mobile agent technology:from first proposals to current evolutions. Microprocessors and Microsystems,2001,25(2):63-64P
    [42]Picco G P. Mobile agents:an introduction. Microprocesspors and Microsystems,2001,25(2):65-74P
    [43]徐晋晖,张伟,路海明.一种具有个性的Agent实现机制.计算机研究与发展,2001,38(6):648-652页
    [44]陶先平.基于Internet的移动agent技术和应用研究.博士论文.南京大学,2001
    [45]Munehiro Fukuda, Lubomir F. Bic, Michael B. Dillencourt. Messengers: Distributed programming using Mobile Agents. Transaction of the SDPS, 2002,5(4):95-112P
    [46]G Wilheim, M Staamann. A Pessimistic Approach to Trust in Mobile Agent Platform. IEEE Internet Computing,2000,4(5):40-48P
    [47]吕建.基于Agent技术的构建框架研究.软件学报,2000,11(8):1018-1023页
    [48]Madiraju, Praveen. An agent module for a system on mobile devices. Lecture Notes in Computer Science, v 3601 LNAI,2005,144-152P
    [49]Rao A S, GeorgeffMP. BDI agent:fromtheory to practice. GeorgeffMP, Proceedings of the 1st International Conference. on Multi-Agent Syestems(ICMAS-95). San Francisco:ACM Press,1995.312.
    [50]Feng X Y, Cao J N, Lu J, et al. An efficient mailbox-based algorithm for message delivery in mobile agent systems. Berlin:Mobile Agent, LNCS2240, Springer-Verlag2001,135-135P
    [51]Bhaumik, P., Bandyopadhyay, S. Mobile agent based message communication in large ad hoc networks through co-operative routing using inter-agent negotiation at rendezvous points. Distributed Computing-IWDC 2005.7th International Workshop. Proceedings (Lecture Notes in Computer Science Vol.3741),2005,554-559P
    [52]王忠群.一种Agent通信算法.软件学报,2003,14(7):1292-1299页
    [53]Kusek, M., Lovrek, I., Sinkovic, V. Agent team coordination in the mobile agent network. Knowledge-Based Intelligent Information and Engineering Systems.9th International Conference, KES,2005,240-246P
    [54]Cabri G., Leonardi L., Reactive Tuple Space for Mobile Agent Coordination, Mobile Agents, LNCS 1477, Springer-Verlag,1998, 237-248P
    [55]Wen-Kui CHANG, Min-Hsiang CHUANG. Performance Mointioriing of Remote Websites Using Mobile Agents. Software Quality Journal, 2004(12):159-176P
    [56]Mosaab Daoud, Wusay H. Mahmoud. Reliability Analysis of Mobile Agent-based Systems.2005 ACM Syposium on Applied Computing.2005,
    92-93P
    [57]朱淼良,邱瑜.移动代理系统综述.计算机研究与发展,2001,38(1):16-25页
    [58]Mosaab Daoud, Wusay H. Mahmoud. Reliability Analysis of Mobile Agent-based Systems.2005 ACM Syposium on Applied Computing.2005, 92-93P
    [59]Peine H. An Introduction to Mobile Agent Programming and the Ara System. Tech. Report, Department of Computer Science, University of Kaiserslautern Germany,1997.
    [60]Peine H., Stolpmann T. Architecture of the Ara Platform for Mobile Agents. Proceedings-of the 1st International Workshop on Mobile Agents, 1997,50
    [61]General Magic. Mobile Agent White Paper, General Magic,1997
    [62]Robert S. G. Agent Tcl:A transportable agent system. Proceedings of the CIKM Workshop on Intelligent Information Agents,4th International Conference on Information and Knowledge Management(CIKM 95),Baltimore, Maryland, December 1995
    [63]IBM Tokyo Research Labs. Aglets Workbench:Programming Mobile Agents in Java,http://www.trl.ibm.co.jp/aglets,1996.
    [64]Johansen D., Renesse R.V., Schneider F. An Introduction to the TACOMA Distributed System-Version 1.0,Tech.Report 95-23, University of Tromso,1995
    [65]Straber M., Baumann J. Mole-A Java Based Mobile Agent System, Special Issues in Object Oriented Programming, dpunkt Verlag 1997,301-308P
    [66]Straber M., Schwehm M. A Performance Model for Mobile Agent Systems,http://www.informatik. uni-stuttgart.de/ipvr/vs/projekte/mole.html, 1997
    [67]Harroud, H., Ahmed, M., Karmouch, A., Gray, T., Impey, R. Agent-based personalized services in a mobile computing environment.2001 IEEE
    Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233),2001,2:728-731P
    [68]冯新宇,陶先平,曹春,等.一种改进的移动Agent通信算法.计算机学报,2002,25(4):357-364页
    [69]陶先平,冯新宇,李新,张冠群,吕建.Mogent系统的通信机制.软件学报,2000,11(8):1060-1065页
    [70]谭湘,顾毓清,包崇明.移动Agent系统安全性研究综述.计算机研究与发展,2003,4(7):984-993页
    [71]D Foster. A Secutity Architecture for Mobile Agent Based Applications. World Wide Web:Internet and Web Information Systems,2003(6): 93-122P
    [72]Giovanni Vigna. Protecting mobile agents through tracing. In:Proceedings of the Third Workshop on Mobile Object Systems. Finland,2002,12-25P
    [73]Kwon H. C, Lee J. T, Kim H. H, Yoo K. J. A migration strategy of mobile agent.8th international Conference on Parallel and Distributed Syestems, 2001.706-712P
    [74]Zqaya Hayfa, Hammadi Slim, Ghedira Khaled. A migration strategy of mobile agents for the transport network applications. Mathematics and Computers in Simulation,2008,76(5):345-362P
    [75]Vapnik V.The nature of statistical Learning Theory. Springer-Verlag,New York,1995
    [76]Corts C, Vapnik V. Support vector networks. Machine Learning,1995, 20(3):273-297P
    [77]Yang Bo, Liu Dayou, Yang Kun, Wang Shengsheng. Strategically migrating agents in itinerary graph. International Conference on Machine Learning and Cybernetics,2003,3:1871-1876P
    [78]王东,吴湘滨,毛先成,刘文剑.旅行商问题优化解之间关系的分析.小型微型计算机系统,2008,29(5):879-884页
    [79]Dorigom, Gambardeua. Ant Colony System:A Cooperative Learning
    Approach to the Travelling Salesman Problem. IEEE Transactions on Evolutionary Computation,1997,1(1):53-66P
    [80]Gomez David, Armero Carmen, Nalin Ranasinqhe. The Traveling Salesman Problem:A self-adapting PSO-ACS algorithm.2nd International Conference on Industrial and Information Systems 2007,479-484P
    [81]Dorigo M, Stutzle T. Ant Colony Optimization. Cambridge, MA:MIT Press,2004
    [82]Manfrin Max, Birattari Mauro, Dorigo Marco. Parallel ant colony optimization for the traveling salesman problem. Ant Colony Optimization and Swarm Intelligence-5th International Workshop,2006,224-234P
    [83]Fan X P, Luo X, Yi S. Path planning for robots based on ant colony optimization algorithm under complex enviromnet. Control and Decision, 2004,19(2):166-170P
    [84]Stutzle T, Hoos H. Max-Min ant system. Future Generation Cpmputer System,2000,16:889-914P
    [85]Derek E. Armstrong, Sheldon H.Jacobson. Studying the Complexity of Global Verification for NP-Hard Discrete Optimization Problems. Journal of Global Optimization,2003,27(1):83-95P
    [86]Dong Hwa Kim, Jin Ill Park.Loss Minimization. Control of Induction Motor Using GA-PSO[J].Lecture Notes in Computer Science. Springer,2005,3682:222-227P
    [87]Robert R G. An introduction to cultural algorithms. In:Proceedings of the 3rd Annual Conference Evolution Programming. Singapore:World Scientific Publishing,1994,131-136P
    [88]R G Reynolds, Z. Michalewicz, M. Cavaretta. Using Cultural Algorithm for Constraint Handling in Genocop. Proceedings of the 4th Annual Conference on Evolutionary Programming,1995,298-305P
    [89]Robert Reynolds, Hasan Alshehri. The Use of Cultural Algorithm with Evolutionary Programming to Control the Data Mining of Large-Scale Spatio-Temporal Databases. IEEE International Conference on Systems, Man and Cybernetics,1997,4098-4103P
    [90]Robert Reynolds, Hasan Alshehri. The Use of Cultural Algorithm with Evolutionary Programming to Guide Decision Tree Induction in Large Databases. IEEE World Congress on Computational Intelligence,1998, 541-546P
    [91]Robert Reynolds, Chan J. Knowledge-Based Self-Adaptation in Evolutionary Programming Using Cultural Algorithms. Proceedings of IEEE Int'1 on Evolutionary Computation,1997,71-76P
    [92]X Jin, Robert Reynolds. Using Knowledge-Based Evolutionary Compution to Solve Nonlinear Cnstraint Optimization Problems:a Cultural Algorithm Approach. Congress on Evolutionary Computation,1999,1672-1678P
    [93]S. Saleem, Robert Reynolds. Cultural Algorithm in Dynamic Environments. Proceedings of 2000 Congress on Evolutionary Computation,2000, 1513-1520P
    [94]S. Saleem. Knowledge-Based Solution to Dynamic Optimization Problems Using Cultural Algorithms. PHD, Wayne State University,2001
    [95]Robert Reynolds, Zhu S. Knowledge-Based Function Optimization Using Fuzzy Cultural Algorithms with Evolutionary Programming. IEEE Trans on Systems, Man and Cybernetics, Part B:Cybernetics,2001,31(1):1-18P
    [96]Robert Reynolds. Cultural Evolutional of Ensemble Learning For Problem Solving. Proceedings of IEEE Congress on Evolutionary Computation, 2006,1119-1126P
    [97]杜琼,周一界.新的进化算法——文化算法.计算机科学,2005,32(9):142-144页
    [98]杨海英,黄皓,窦全胜.基于文化算法的负载均衡自适应机制.计算机工程与应用,2005,21:146-191页
    [99]艾景波.文化粒子群优化算法及其在布局设计中的应用研究.硕士论文,大连理工大学,2005
    [100]刘纯青,杨莘元,张颖.基于文化算法的聚类分析.计算机应用,2006,26(12):2953-2960页
    [101]刘纯青,杨莘元.文化算法应用于阵列天线方向图综合.弹箭与制导学报,2006,26(3):303-308页
    [102]黄海燕,顾幸生,刘漫丹.求解约束优化问题的文化算法研究.自动化学报,2007,33(10):1115-1120页
    [103]Xingsheng Gu. Application of Cultural Algorithms to Earliness/Tardiness Flow Shop with Uncertain Processing Time, ICNC 2007
    [104]O.Hasancebi, F.Erbatur. On Efficient Use of Simulated Annealing in Complex Structural Optimization Problems [J]. Acts Mechanica,2002,157(1):27-50P
    [105]谭湘.移动Agent系统安全性若干问题研究.[博士论文].中国科学院研究生院,2005.
    [106]Joan Mir, Joan Borell. Protecting General Flexible Itineraries of Mobile Agents. Lecture Notes in Computer Science, Springer Berlin,2002,2288: 231-244P
    [107]孙克强,刘嘉勇,丁光华.基于Hash函数和对称加密算法的一次性口令方案.信息与电子工程,2007,5(6):449-452页
    [108]Sasaki Yu, Naito Yusuke, Kunihiro Noboru, Ohta Kazuo. Improved collision attacks on MD4 and MD5. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,2007, E90-A(1): 36-46P
    [109]Yu Hongbo, Wang Gaoli, Zhang Guoyan, Wang Xiaoyun. The second-preimage attack on MD4.4th International Conference on Crytology and Network Security,2005,1-12P
    [110]Wang Xiaoyun, Yin Yiqun Lisa, Yu Hongbo. Finding collisions in the full SHA-1.25th Annual International Cryptology Conference,2005,17-36P
    [111]刘刚,司渐美.对一个双向身份认证方案的改进.计算机安全,2006,10(5):7-8页
    [112]徐梦茗,肖聪,李斌,杜彪.安全协议形式化分析的研究和实现.信息安全与通信保密,2008,2:76-78页
    [113]蒋毅,史浩山,赵洪钢.基于分级Merkle树的无限传感器网络广播认证策略.系统仿真学报,2007,19(24):5700-5704页
    [114]Josep Domingo Ferrer. Mobile agent route protection through hash based mechanisms. LNCS 2247[C]. Berlin:Springer-Verlag,2001,17-29P
    [115]Josep Domingo Ferrer, M Alba, F Sebe. Asynchronous large scale certification based on certification trees. IFIP Communiacaitons and Multimedia Security 2001. Boston MA:Kluwer,2000,185-196P
    [116]Qiu Weidong, Guan Haibin, Jiang Xinqhao, Huang Zheng. Group oriented secure routing protocol of mobile agents.20th IEEE International Conference on Micro Electro Mechanical Systems,2007,526-529P

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700