Sciweavers

1519 search results - page 19 / 304
» Authentication for Mobile Agents
Sort
View
ISCAPDCS
2004
15 years 1 months ago
High-Level Interoperability between Java-based Mobile Agent Systems
One of the major setback preventing the mobile agent technology from being widely exploited is a lack of interoperability between heterogeneous mobile agent systems. In this paper...
Giancarlo Fortino, Wilma Russo
CSUR
2004
132views more  CSUR 2004»
14 years 11 months ago
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
Over the past years, mobile agent technology has attracted considerable attention, and a significant body of literature has been published. To further develop mobile agent technol...
Stefan Pleisch, André Schiper
MATA
2000
Springer
15 years 3 months ago
The Effects of Mobile Agent Performance on MP3 Streaming Applications
This paper considers the use of software mobile agents as proxy agents, to provide seamless mobility and cater for heterogeneous devices and network characteristics. We specificall...
Binh Thai, Aruna Seneviratne
ICWN
2009
14 years 9 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
ITCC
2005
IEEE
15 years 5 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch