Wanted: A theft-deterrent solution for the pervasive computing worldPatrick DrozCeki Gulcuet al.2000ICCCN 2000Conference paper
An architecture for cross-organisational business processesY. HoffnerH. Lwdwiget al.2000WECWIS 2000Conference paper
Protecting the computation results of free-roaming agentsG. KarjothN. Asokanet al.1998Personal and Ubiquitous ComputingPaper