Mobile agent security through multi-agent cryptographic protocols. Page: II
The following text was automatically extracted from the image on this page using optical character recognition software:
Deep thanks to my advisor, Dr. Steve Tate, for suggesting the topic and continuous guidance
throughout the research, for numerous fruitful discussions about some of the most intriguing details
in this work, for moral support and encouragement, and for providing ample opportunities for
me to interact with the research community. Thanks to the committee members, Dr. Mikler
and Dr. Dantu, for the hard work of reviewing this dissertation and providing helpful feedbacks.
Furthermore, this research was supported in part by the National Science Foundation, Trusted
Computing program, award 0208640.
Every step in my life would have been impossible without the greatest love and support from
my parents. Thank you, Mom and Dad, for your indispensable role in this remarkable journey.
Here’s what’s next.
This dissertation can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Dissertation.
Xu, Ke. Mobile agent security through multi-agent cryptographic protocols., dissertation, May 2004; Denton, Texas. (digital.library.unt.edu/ark:/67531/metadc4473/m1/3/: accessed October 20, 2018), University of North Texas Libraries, Digital Library, digital.library.unt.edu; .