Sciweavers

1519 search results - page 13 / 304
» Authentication for Mobile Agents
Sort
View
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
15 years 5 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
WAIM
2005
Springer
15 years 5 months ago
Simulating a Finite State Mobile Agent System
This paper analyzes the simulation of Finite State mobile agent, which regards the migration, execution, and searching of the mobile agents as finite states. As the finite state mo...
Yong Liu, Congfu Xu, Yanyu Chen, Yunhe Pan
ECBS
2002
IEEE
82views Hardware» more  ECBS 2002»
15 years 4 months ago
Mobile Agent Interoperability Patterns and Practice
A major setback for mobile agent technology is a lack of interoperability between systems for mobile agents which prevents them from reaching “critical mass”. In this paper, w...
Ulrich Pinsdorf, Volker Roth
JMM
2007
107views more  JMM 2007»
14 years 11 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
15 years 1 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin