Sciweavers

686 search results - page 87 / 138
» Securing Mobile Agent Based Tele-Assistance Systems
Sort
View
SIGECOM
2004
ACM
115views ECommerce» more  SIGECOM 2004»
15 years 5 months ago
Limited reputation sharing in P2P systems
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
Sergio Marti, Hector Garcia-Molina
CCS
2001
ACM
15 years 4 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ICTCS
2001
Springer
15 years 4 months ago
Subtyping and Matching for Mobile Objects
In [BCC00], we presented a general framework for extending calculi of mobile agents with object-oriented features, and we studied a typed instance of that model based on Cardelli a...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
WIMOB
2007
IEEE
15 years 6 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
GECCO
2005
Springer
114views Optimization» more  GECCO 2005»
15 years 5 months ago
A resource-allocation mechanism for multiagent networks
The nature of computer networks and the manner in which network services are provided are changing dramatically. Network architectures that employ virtual mobile agents to provide...
Vishakh, Nicholas Urrea, Tadashi Nakano, Tatsuya S...