[1]
“Proposed Protocol for State Tampering Mobile Agents Security”, J. eng. sustain. dev., vol. 13, no. 4, pp. 49–57, Dec. 2009, Accessed: Jul. 01, 2024. [Online]. Available: https://jeasd.uomustansiriyah.edu.iq/index.php/jeasd/article/view/1496