Sciweavers

1519 search results - page 9 / 304
» Authentication for Mobile Agents
Sort
View
MATA
2001
Springer
158views Communications» more  MATA 2001»
15 years 2 months ago
Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents
This paper presents a framework for building network protocols for migrating mobile agents over a network. The framework allows network protocols for agent migration to be naturall...
Ichiro Satoh
ISW
2010
Springer
14 years 7 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...
PERCOM
2005
ACM
15 years 9 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
79
Voted
IC
2004
14 years 11 months ago
Mobile Agents: A Construction Kit for Mobile Device Applications
Abstract-- Mobile Agents are a well-known programming paradigm nowadays. There is a multitude of research concerning Mobile Agent Systems with emphasize on agent coordination, agen...
Michael Friedrich, Kirsten Terfloth, Gerd Nusser, ...
APWEB
2004
Springer
15 years 2 months ago
A Finite State Mobile Agent Computation Model
In this paper, a novel formalized finite state mobile agent computation model based on the virtual organization is presented. In this model, all the actions (e.g. service, migratio...
Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, Yun...