Sciweavers

1519 search results - page 12 / 304
» Authentication for Mobile Agents
Sort
View
IMECS
2007
15 years 1 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
IAT
2005
IEEE
15 years 5 months ago
Dynamic Determination of the Itinerary of Mobile Agents with Timing Constraints
The mobile agent technology is an important research area in the scope of code mobility. As part of an agent mission objective, it may exist the necessity of meeting an end-to-end...
Luciana Rech, Rômulo Silva de Oliveira, Carl...
UIST
2004
ACM
15 years 5 months ago
A gesture-based authentication scheme for untrusted public terminals
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This...
Shwetak N. Patel, Jeffrey S. Pierce, Gregory D. Ab...
AINA
2005
IEEE
15 years 5 months ago
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
SAC
2002
ACM
14 years 11 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...