Sciweavers

91 search results - page 7 / 19
» A configurable mobile agent data protection protocol
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
14 years 9 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
73
Voted
IPPS
2008
IEEE
15 years 4 months ago
Self-stabilizing population of mobile agents
We investigate a problem of maintaining a target population of mobile agents in a distributed system. The purpose of the agents is to perform certain activities, so the goal is to...
Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz ...
CONEXT
2006
ACM
15 years 3 months ago
Migrating home agents towards internet-scale mobility deployments
While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these te...
Ryuji Wakikawa, Guillaume Valadon, Jun Murai
ETFA
2008
IEEE
14 years 9 months ago
Self-configuration of an adaptive TDMA wireless communication protocol for teams of mobile robots
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such...
Frederico Santos, Luís Almeida, Luís...
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 9 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...