Sciweavers

1216 search results - page 4 / 244
» Self-Protected Mobile Agents
Sort
View
113
Voted
ISCIS
2005
Springer
15 years 3 months ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan
125
Voted
WOA
2010
14 years 8 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
68
Voted
IAT
2005
IEEE
15 years 3 months ago
Dynamic Determination of the Itinerary of Mobile Agents with Timing Constraints
The mobile agent technology is an important research area in the scope of code mobility. As part of an agent mission objective, it may exist the necessity of meeting an end-to-end...
Luciana Rech, Rômulo Silva de Oliveira, Carl...
82
Voted
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
15 years 3 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
93
Voted
WAIM
2005
Springer
15 years 3 months ago
Simulating a Finite State Mobile Agent System
This paper analyzes the simulation of Finite State mobile agent, which regards the migration, execution, and searching of the mobile agents as finite states. As the finite state mo...
Yong Liu, Congfu Xu, Yanyu Chen, Yunhe Pan