Sciweavers

1519 search results - page 57 / 304
» Authentication for Mobile Agents
Sort
View
OTM
2007
Springer
15 years 6 months ago
A Novel Overlay Network for a Secure Global Home Agent Dynamic Discovery
Mobile IP and Network Mobility are the IETF proposals to obtain mobility. However, both of them have routing limitations, due to the presence of an entity (Home Agent) in the commu...
Ángel Cuevas, Rubén Cuevas Rum&iacut...
IJSWIS
2008
117views more  IJSWIS 2008»
14 years 12 months ago
Semantic Web Services and Mobile Agents Integration for Efficient Mobile Services
The requirement for ubiquitous service access in wireless environments presents a great challenge in light of well known problems like high error rate and frequent disconnections....
Vasileios Baousis, Vassilis Spiliopoulos, Elias Za...
ECBS
2002
IEEE
115views Hardware» more  ECBS 2002»
15 years 4 months ago
An Extensible Software Architecture for Mobile Components
This paper presents a generic software architecture for large-scale distributed applications in which mobile agents are an integral part. We developed this architecture through th...
Dag Johansen, Kåre J. Lauvset, Keith Marzull...
ICS
2003
Tsinghua U.
15 years 5 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
ICDE
2003
IEEE
137views Database» more  ICDE 2003»
15 years 5 months ago
Personalized Portals for the Wireless and Mobile User; a Mobile Agent Approach
The Wireless environment requires new type of services and new ways for structuring the needed content. Personalization comes into aid via the creation of personalized portals tha...
Christoforos Panayiotou, George Samaras