Sciweavers

193 search results - page 27 / 39
» Universally Composable Secure Mobile Agent Computation
Sort
View
IJNSEC
2008
129views more  IJNSEC 2008»
14 years 11 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
ISSA
2004
15 years 1 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
111
Voted
ATAL
2004
Springer
15 years 3 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
DIM
2007
ACM
15 years 3 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
MWCN
2004
Springer
15 years 5 months ago
Peer-to-Peer Based Architecture for Mobility Management in Wireless Networks
: Mobility management is an important task in wireless networks. The Mobile IP protocol provides a basic solution to the mobility management. However, Mobile IP suffers from severa...
Shou-Chih Lo, Wen-Tsuen Chen