Sciweavers

1519 search results - page 15 / 304
» Authentication for Mobile Agents
Sort
View
SEKE
2005
Springer
15 years 5 months ago
Design an Interoperable Mobile Agent System Based on Predicate Transition Net Models
Mobile agents provide an effective and flexible style to develop advanced distributed systems. In order to promote interoperability and ensure the quality of mobile agent systems,...
Junhua Ding, Dianxiang Xu, Yi Deng, Peter J. Clark...
MA
2000
Springer
134views Communications» more  MA 2000»
15 years 3 months ago
A Reliable Message Delivery Protocol for Mobile Agents
The abstractions and protocol mechanisms that form the basis for inter-agent communications can significantly impact the overall design and effectiveness of Mobile Agent systems. W...
Mudumbai Ranganathan, Marc Bednarek, Doug Montgome...
OPODIS
2001
15 years 1 months ago
Mobile agents: a suitable support for service provision in mobile computing environments
This paper aims to investigate the use of mobile agents for service provision in mobile computing environments. A quantitative model and experimental measurements are performed to ...
Ouahiba Fouial, Nadia Boukhatem, Isabelle M. Demeu...
149
Voted
ESAS
2007
Springer
15 years 3 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
NOMS
2000
IEEE
112views Communications» more  NOMS 2000»
15 years 4 months ago
Integration of mobile agents with SNMP: why and how
Mobile agents have been proposed as a solution to the problem of the management of increasingly heterogeneous networks. However, the proposed solutions often ignore the value of l...
Bernard Pagurek, Y. Wang, Tony White