Sciweavers

1519 search results - page 18 / 304
» Authentication for Mobile Agents
Sort
View
ADHOC
2007
134views more  ADHOC 2007»
14 years 11 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 4 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
14 years 9 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
ATAL
2006
Springer
15 years 3 months ago
A service-oriented language for programming mobile agents
In this paper we present Mob, a service-oriented scripting language for programming mobile agents in distributed systems. The main feature of the language is the integration of th...
Hervé Paulino, Luís M. B. Lopes
SYNASC
2005
IEEE
97views Algorithms» more  SYNASC 2005»
15 years 5 months ago
Mobile Agents in a Multi-Agent E-Commerce System
Among features often attributed to software agents are autonomy and mobility. Autonomy of e-commerce agents involves adaptability to engage in negotiations governed by mechanisms ...
Costin Badica, Maria Ganzha, Marcin Paprzycki