Sciweavers

375 search results - page 34 / 75
» Using Mobile Agents for Secure Biometric Authentication
Sort
View
193
Voted
ACSC
2004
IEEE
15 years 7 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
148
Voted
DASC
2006
IEEE
15 years 7 months ago
Runtime Security Verification for Itinerary-Driven Mobile Agents
We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from t...
Zijiang Yang, Shiyong Lu, Ping Yang
KESAMSTA
2007
Springer
15 years 9 months ago
Mobile Collaboration Framework for u-Healthcare Agent Services and Its Application Using PDAs
In this paper, we suggested a mobile collaboration framework based on distributed object group framework (DOGF). This paper focuses on the use of this framework to support mobile c...
Chang-Won Jeong, Dong-Ho Kim, Su-Chong Joo
143
Voted
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 9 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
142
Voted
COMCOM
2000
95views more  COMCOM 2000»
15 years 3 months ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen