Sciweavers

1519 search results - page 30 / 304
» Authentication for Mobile Agents
Sort
View
ASIACRYPT
2000
Springer
15 years 4 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
MOBICOM
1996
ACM
15 years 4 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
MIS
2008
Springer
151views Multimedia» more  MIS 2008»
14 years 11 months ago
Novel directory service and message delivery mechanism enabling scalable mobile agent communication
Mobile agent technology has emerged as a promising programming paradigm for developing highly dynamic and large-scale service-oriented computing middlewares due to its desirable fe...
Jinho Ahn
IRI
2006
IEEE
15 years 5 months ago
A new model for the itinerary definition of real-time imprecise mobile agents
In information retrieving applications, mobile agents may have to finish their mission before a deadline. Also, there may be some flexibility for the itinerary definition due to o...
Luciana Rech, Carlos Montez, Rômulo Silva de...
ICC
2007
IEEE
15 years 6 months ago
Load Balancing in Mobile IPv6's Correspondent Networks with Mobility Agents
—A foreseeable scenario is where on the Internet Mobile IPv6 is deployed and a large percentage of the clients are mobile nodes. These mobile clients will communicate with large ...
Albert Cabellos-Aparicio, Jordi Domingo-Pascual