Sciweavers

2808 search results - page 54 / 562
» Mobile Agent Security
Sort
View
SMARTNET
2000
15 years 6 months ago
Software Agent Constrained Mobility for Network Performance Monitoring
During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
Christos Bohoris, Antonio Liotta, George Pavlou
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
15 years 7 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
JPDC
2006
141views more  JPDC 2006»
15 years 5 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
145
Voted
ICIW
2007
IEEE
15 years 11 months ago
Towards Secure Mobile P2P Systems
The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile P2P systems. However, the nature of mobile devices brings additiona...
James Walkerdine, Simon Lock
137
Voted
CIA
1998
Springer
15 years 9 months ago
Melding Abstractions with Mobile Agents
Antonio Corradi, Marco Cremonini, Cesare Stefanell...