Sciweavers

270 search results - page 2 / 54
» Distribution of Mobile Agents in Vulnerable Networks
Sort
View
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
13 years 10 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
PERCOM
2005
ACM
14 years 4 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
MOBICOM
2010
ACM
13 years 5 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
AINA
2004
IEEE
13 years 8 months ago
Distributed Logic Programming using Mobile Agents
Tzone I. Wang, Keith L. Clark