Sciweavers

1519 search results - page 42 / 304
» Authentication for Mobile Agents
Sort
View
AGENTS
1997
Springer
15 years 3 months ago
Basic Agents for Visual/Motor Coordination of a Mobile Robot
Maria C. García-Alegre, Felicidad Recio
ATAL
2007
Springer
15 years 3 months ago
Towards reflective mobile agents for resource-constrained mobile devices
The vision of ubiquitous computing is one in which resource constrained mobile devices form ad-hoc networks to enable the delivery of services that are sensitive and responsive to...
Conor Muldoon, Gregory M. P. O'Hare, John F. Bradl...
EUROPKI
2004
Springer
15 years 5 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
BROADNETS
2005
IEEE
15 years 5 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
DEXAW
2002
IEEE
97views Database» more  DEXAW 2002»
15 years 4 months ago
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
Yan Wang 0002, Kian-Lee Tan, Xiaolin Pang