Sciweavers

2808 search results - page 69 / 562
» Mobile Agent Security
Sort
View
JIRS
2002
78views more  JIRS 2002»
15 years 5 months ago
A Mobile Agents Approach to Virtual Laboratories and Remote Supervision
This paper presents the use of adaptive mobile agents for remote operation, enabling real-time response in spite of the limitations of the communication channels in terms of time-d...
Luis M. Camarinha-Matos, Octavio Castolo, Walter V...
CSREASAM
2006
15 years 6 months ago
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing
A mobile ad hoc network is a self-organizing network that relies on the cooperation of participating nodes in order to function properly. In this network, mobile users arrive withi...
Ebrahim Khosravi, Brandy Tyson
COMCOM
2004
120views more  COMCOM 2004»
15 years 5 months ago
IPsec-based end-to-end VPN deployment over UMTS
Next generation mobile users require flexible security mechanisms, which provide customized security services to data traffic, take into account end-user mobility and mobile netwo...
Christos Xenakis, Lazaros F. Merakos
PERCOM
2005
ACM
16 years 5 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
AGENTS
2001
Springer
15 years 10 months ago
Specifying agent behavior as concurrent tasks
Software agents are currently the subject of much research in many interrelated fields. Unfortunately, there has not been enough emphasis on defining the techniques required to bu...
Scott A. DeLoach