A review of security techniques for mobile agents | IEEE Conference Publication | IEEE Xplore