Sciweavers

1519 search results - page 8 / 304
» Authentication for Mobile Agents
Sort
View
JSS
2006
65views more  JSS 2006»
14 years 9 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
TWC
2008
129views more  TWC 2008»
14 years 9 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
HUC
2007
Springer
15 years 3 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
79
Voted
BWCCA
2010
14 years 4 months ago
Comments on a One-Way Hash Chain Based Authentication for FMIPv6
In this paper, we analyze a one-way hash chain based authentication scheme proposed by Haddad and Krishnan. The authentication scheme has been introduced for improving handover per...
Ilsun You, Jong-Hyouk Lee
ICIW
2008
IEEE
15 years 4 months ago
Persistency for Java-Based Mobile Agent Systems
—In this paper, we present mobile agent systems supporting persistency. In order to develop the mobile agent systems, a mobile agent framework has to have functions to support pe...
Shinichi Motomura, Takao Kawamura, Kazunori Sugaha...