Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Security architecture and methodology for authorisation of mobile agents
Awais Shibli, Alessandro Giambruno, Sead Muftic
International Journal of Internet Technology and Secured Transactions (IJITST), 2010 Vol.2 No.3/4, pp.271 - 290
9 - 2 =

Thank you for your feedback.