Sciweavers

1519 search results - page 20 / 304
» Authentication for Mobile Agents
Sort
View
ISADS
2003
IEEE
15 years 5 months ago
Mobile Agent Fault Tolerance for Information Retrieval Applications: An Exception Handling Approach
Maintaining mobile agent availability in the presence of agent server crashes is a challenging issue since developers normally have no control over remote agent servers. A popular...
Simon Pears, Jie Xu, Cornelia Boldyreff
ISORC
2003
IEEE
15 years 5 months ago
A Dynamic Shadow Approach for Mobile Agents to Survive Crash Failures
Fault tolerance schemes for mobile agents to survive agent server crash failures are complex since developers normally have no control over remote agent servers. Some solutions mo...
Simon Pears, Jie Xu, Cornelia Boldyreff
CSREASAM
2006
15 years 1 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
DIM
2007
ACM
15 years 3 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
IJNSEC
2006
113views more  IJNSEC 2006»
14 years 11 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez