Sciweavers

722 search results - page 69 / 145
» Offering Mobile Security as a Service
Sort
View
IJNSEC
2006
200views more  IJNSEC 2006»
14 years 9 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
HASE
2007
IEEE
15 years 4 months ago
A Mobile Agent-based Multi-Robot Design Method for High-Assurance
During the past several years, the area of robot service and multi-robot has grown rapidly. Since this area is a fusion industry consisting of multiple disciplines, it is lack of ...
Sung-Ook Shin, Jung-Oog Lee, Doo-Kwon Baik
CSREASAM
2007
14 years 11 months ago
A PDA Implementation of an Off-line e-Cash Protocol
— We present an efficient implementation of a fair e-cash protocol especially designed for mobile wireless environments. Our protocol attempts to offer a reasonable balance betw...
Efrén Clemente-Cuervo, Francisco Rodr&iacut...
ICDCSW
2003
IEEE
15 years 3 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
GLOBECOM
2009
IEEE
15 years 4 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak