Sciweavers

1519 search results - page 8 / 304
» Authentication for Mobile Agents
Sort
View
JSS
2006
65views more  JSS 2006»
14 years 11 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
TWC
2008
129views more  TWC 2008»
14 years 11 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
HUC
2007
Springer
15 years 5 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
BWCCA
2010
14 years 6 months ago
Comments on a One-Way Hash Chain Based Authentication for FMIPv6
In this paper, we analyze a one-way hash chain based authentication scheme proposed by Haddad and Krishnan. The authentication scheme has been introduced for improving handover per...
Ilsun You, Jong-Hyouk Lee
ICIW
2008
IEEE
15 years 6 months ago
Persistency for Java-Based Mobile Agent Systems
—In this paper, we present mobile agent systems supporting persistency. In order to develop the mobile agent systems, a mobile agent framework has to have functions to support pe...
Shinichi Motomura, Takao Kawamura, Kazunori Sugaha...