[1] J. Zhu and J. Ma, “A New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, 2004, pp. 231-235.
[2] W. A. Arbaugh, “Wireless Security Is Different,” Magazine of IEEE Computer Society, Computer, Vol. 36, No. 8, 2003, pp. 99-101.
http://dx.doi.org/10.1109/MC.2003.1220591
[3] H. Yang, F. Ricciato, L. Songwu and L. Zhang, “Securing a wireless world,” The Proceedings of IEEE, Vol. 94, No. 2, 2006, pp. 442-454.
http://dx.doi.org/10.1109/JPROC.2005.862321
[4] S. P. Alampalayam and A. Kumar, “An Adaptive Security Model for Mobile Agents in Wireless Networks,” IEEE Global Telecommunications Conference, Newark, 1-5 December 2003, pp. 1516-1521.
[5] L. Vasiu and Q. H. Mahmoud, “Mobile agents in Wire-less Devices,” Magazine of IEEE Computer Society, Computer, 2004, Vol. 37, No. 2, pp. 104-105.
http://dx.doi.org/10.1109/MC.2004.1266304
[6] W. Arbaugh, N. Shankar, Y. Wan and K. Zhang, “Your 802.11 Wireless Network Has No Clothes,” IEEE Wire-less Communication, Vol. 9, No. 6, 2002, pp. 44-51.
http://dx.doi.org/10.1109/MWC.2002.1160080
[7] A. Karnik and K. Passerini, “Wireless Network Security—A Discussion from a Business Perspective,” Proceedings of IEEE Wireless Telecommunications Symposium, Nicosia, April 2005, pp. 261-267.
[8] A. Mishra and W. A. Arbaugh, “An Initial Security Analysis of the IEEE 802.1× Standard,” Report No CS-TR-4328, 2002.
http://www.cs.umd.edu/~waa/1x.pdf
[9] J. White, “Mobile Agents White Paper,” General Magic, Inc., 1996.
http://citeseer.ist.psu.edu/white96mobile.html
[10] D. Lange and M. Oshima, “Seven Good Reasons for Mobile Agents,” Communications of ACM, 1999, Vol. 42, No. 3, pp. 88-89.
http://dx.doi.org/10.1145/295685.298136
[11] A. Corradi, R. Montanari and C. Stefanelli, “Security No.s in Mobile Agent Technology,” Proceedings of 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS’99), Cape Town, December 1999, pp. 3-8.
[12] N. Borselius, “Mobile Agent Security”, Electronics and Communication Engineering Journal, Vol. 4, No. 5, 2002, pp. 211-218. http://dx.doi.org/10.1049/ecej:20020504
[13] H. Aouadi and M. B. Ahamed, “Modile Agents Security,” 2nd International Conference on Mobile Technology, Applications and Systems, Guangzhou, November 2005, pp. 1-6.
[14] Y. Wang, C. Wang and L. Cheng-Horng, “Mobile Agent Protection and Verification in the Internet Environment,” Proceedings of 4th International Conference on Computer and Information Technology, Wuhan, September 2004, pp. 482-487,
[15] N. Aboudagga, M. T. Refaei, M. Eltoweissy, L. A. Dasilva and J. Quisquater, “Authentication Protocols for Ad Hoc Networks: Taxonomy and Research No.s,” Proceedings of 1st ACM International Workshop on QoS and Security in Wireless and Mobile Networks, Montreal, October 2005, pp. 96-104.