Sciweavers

91 search results - page 6 / 19
» A configurable mobile agent data protection protocol
Sort
View
63
Voted
ATAL
2008
Springer
14 years 11 months ago
A mobile agent approach to opportunistic harvesting in wireless sensor networks
This demonstration illustrates the feasibility of harvesting data from a WSN by interested parties, either in the WSN coverage area or in a remote location. Embedded and mobile ag...
Richard Tynan, Conor Muldoon, Michael J. O'Grady, ...
75
Voted
AAAI
1996
14 years 11 months ago
Supporting Performance and Configuration Management of GTE Cellular Networks
GTE Laboratories, in cooperation with GTE Mobilnet, has developed and deployed PERFFEX (PERFormance Expert), an intelligent system for performance and configuration management of ...
Ming Tan, Carol Lafond, Gabriel Jakobson, Gary You...
JSAC
2006
136views more  JSAC 2006»
14 years 9 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
JNSM
2010
110views more  JNSM 2010»
14 years 4 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
ICC
2009
IEEE
149views Communications» more  ICC 2009»
15 years 4 months ago
Performance of Host Identity Protocol on Symbian OS
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov