Sciweavers

1226 search results - page 24 / 246
» Secure Mobile Gambling
Sort
View
PDCAT
2005
Springer
15 years 3 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
AGENTS
1998
Springer
15 years 1 months ago
A Hybrid Procedural/Deductive Executive for Autonomous Spacecraft
The New Millennium Remote Agent NMRA will be the rst AI system to control an actual spacecraft. The spacecraft domain places a strong premium on autonomy and requires dynamic reco...
Barney Pell, Edward B. Gamble, Erann Gat, Ron Kees...
ISW
2004
Springer
15 years 3 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate
ICT
2004
Springer
158views Communications» more  ICT 2004»
15 years 3 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
IJNSEC
2006
88views more  IJNSEC 2006»
14 years 9 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang