Sciweavers

18 search results - page 3 / 4
» Transaction Based Authentication Scheme for Mobile Communica...
Sort
View
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
13 years 10 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan
ICC
2008
IEEE
133views Communications» more  ICC 2008»
13 years 11 months ago
Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks
Abstract—Wireless mesh network (WMN) has emerged recently as a promising technology for next-generation wireless networking. In WMN, it is important to provide an efficient hand...
Bo Rong, Yi Qian, Kejie Lu, Michel Kadoch
NDSS
1999
IEEE
13 years 9 months ago
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes
Anonymity of ballots in electronic voting schemes usually relies on the existence of some kind of anonymous channel between voters and ballot collecting authorities. Currently, th...
Andreu Riera, Joan Borrell
SCN
2010
Springer
143views Communications» more  SCN 2010»
13 years 3 months ago
History-Free Aggregate Message Authentication Codes
Aggregate message authentication codes, as introduced by Katz and Lindell (CT-RSA 2008), combine several MACs into a single value, which has roughly the same size as an ordinary MA...
Oliver Eikemeier, Marc Fischlin, Jens-Fabian G&oum...
VLDB
2002
ACM
165views Database» more  VLDB 2002»
13 years 4 months ago
RTMonitor: Real-Time Data Monitoring Using Mobile Agent Technologies
RTMonitor is a real-time data management system for traffic navigation applications. In our system, mobile vehicles initiate time-constrained navigation requests and RTMonitor cal...
Kam-yiu Lam, Alan Kwan, Krithi Ramamritham