Return to Article Details METHODS OF PROTECTION OF DISTRIBUTED COMPUTING IN A MULTI-AGENT SYSTEM Download Download PDF