Sciweavers

1519 search results - page 28 / 304
» Authentication for Mobile Agents
Sort
View
MADNES
2005
Springer
15 years 5 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
PDPTA
2003
15 years 1 months ago
Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing
- Pervasive computing is an emerging technology that brings new dimensions to distributed computing; it uses a wide variety of smart, ubiquitous devices throughout an individual’...
David Levine, Renjith Thomas, Farhad Kamangar, Ger...
JSS
2010
111views more  JSS 2010»
14 years 10 months ago
Promoting the development of secure mobile agent applications
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...
IEEEARES
2007
IEEE
15 years 6 months ago
Attacks are Protocols Too
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
Anders Moen Hagalisletto
ICC
2008
IEEE
123views Communications» more  ICC 2008»
15 years 6 months ago
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...