Sciweavers

1216 search results - page 25 / 244
» Self-Protected Mobile Agents
Sort
View
102
Voted
DEXAW
2002
IEEE
97views Database» more  DEXAW 2002»
15 years 5 months ago
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
Yan Wang 0002, Kian-Lee Tan, Xiaolin Pang
93
Voted
COMPSAC
2006
IEEE
15 years 4 months ago
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks
This paper proposes an improved free-roaming mobile agent security protocol. The scheme uses "one hop backwards and two hops forwards" chain relation as the protocol cor...
Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Lu...
91
Voted
JCIT
2008
104views more  JCIT 2008»
15 years 13 days ago
Research and Design on Personalized Learning System Based on Mobile Agent
In view of students' individual difference in the learning process, in this paper we propose a personalized learning system, to which intelligent Agent technique and case-bas...
Yang He-biao, Chen Yu-kun, Wang Jue, Liu Zhi-hong
IJWMC
2010
103views more  IJWMC 2010»
14 years 9 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
IFIP
1998
Springer
15 years 4 months ago
Security Requirements for Mobile Agents in Electronic Markets
Abstract. In this article we identify security threats and requirements for software agent systems in the context of an electronic market. A short description of our own agent syst...
Michael Zapf, Helge Müller, Kurt Geihs