Sciweavers

981 search results - page 86 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
87
Voted
JNSM
2000
78views more  JNSM 2000»
15 years 1 months ago
A Framework and Lightweight Protocol for Multimedia Network Management
The increasing complexities of modern networks coupled with the popularity of multimedia applications have placed higher demands on network managers. This paper reviews the main r...
Jairo A. Gutiérrez, Don Sheridan, R. Radhak...
SIGOPSE
2000
ACM
15 years 5 months ago
The data management problem in post-pc devices and a solution
The demand for network-enabled limited-footprint mobile devices is increasing rapidly. A central challenge that must be addressed in order to use these next-generation devices eff...
Ramakrishna Gummadi, Randy H. Katz
IEAAIE
2010
Springer
14 years 11 months ago
Temporal Bounded Planner Agent for Dynamic Industrial Environments
This paper presents a time bounded real-time agent, the core of a Multi-agent System aimed at managing the security in manufacturing environments, where time constraints are a key ...
Juan Francisco de Paz, Martí Navarro, Sara ...
CCS
2001
ACM
15 years 6 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CCS
2009
ACM
15 years 8 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...