“…The proposed solutions include the use of cooperative agents (Roth, 1998;Ouardani et al, 2007), cryptographic tracing (Vigna, 1997), obfuscated code (Hohl, 1998), secure coprocessors (Yee, 1994), protection of the computational results (Maggi and Sisto, 2003), or cryptographic protection of itineraries (Mir and Borrell, 2003).…”