Sciweavers

154 search results - page 9 / 31
» Authenticity in a Reliable Protocol for Mobile Computing
Sort
View
AINA
2004
IEEE
15 years 1 months ago
Region-based Stage Construction Protocol for Fault tolerant Execution of Mobile Agent
Fault tolerance is essential to the development of reliable mobile agent system in order to guarantee continuous execution of mobile agents. For this purpose, some previous works ...
SungJin Choi, MaengSoon Baik, HongSoo Kim, JunWeon...
CASES
2010
ACM
14 years 7 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
EDCC
1999
Springer
15 years 1 months ago
Efficient Reliable Real-Time Group Communication for Wireless Local Area Networks
We consider teams of mobile autonomous robot systems that coordinate their work via communication over a wireless local area network. In such a scenario, timely delivery and group...
Michael Mock, Edgar Nett, Stefan Schemmer
WOA
2010
14 years 7 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
LCN
2000
IEEE
15 years 2 months ago
Tree-Based Reliable Multicast in Combined Fixed/Mobile IP Networks
This paper proposes a solution to delivering multicast data reliably not only to/from fixed hosts but also to/from mobile hosts in combined fixed/mobile IP networks, particularl...
Wonyong Yoon, Dongman Lee, Chansu Yu, Myungchul Ki...