Sciweavers

1519 search results - page 34 / 304
» Authentication for Mobile Agents
Sort
View
CCS
2010
ACM
15 years 19 hour ago
Efficient sensor node authentication via 3GPP mobile communication networks
Energy efficiency is one of important issues in the resource contrained wireless sensor network. In this paper, we propose the authentication and key agreement protocol that effic...
Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Sh...
IWANN
2009
Springer
15 years 6 months ago
Agents Jumping in the Air: Dream or Reality?
Mobile agent technology has traditionally been recognized as a very useful approach to build applications for mobile computing and wireless environments. However, only a few studie...
Oscar Urra, Sergio Ilarri, Eduardo Mena
CORR
2006
Springer
206views Education» more  CORR 2006»
14 years 12 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
IC
2004
15 years 1 months ago
A Scheme for Personalized Bookmark Services in a Mobile Agent Environment
Recent popularity of web-enabled mobile devices such as handheld devices and PDAs has made mobile Internet access very popular. However, considering the limitation of mobile devic...
Sohryun Shin, Eenjun Hwang
CCS
2001
ACM
15 years 4 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé