Sciweavers

375 search results - page 46 / 75
» Using Mobile Agents for Secure Biometric Authentication
Sort
View
ACSAC
1999
IEEE
15 years 4 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
PADL
2001
Springer
15 years 4 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 6 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
MOBIHOC
2007
ACM
15 years 11 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
CEEMAS
2003
Springer
15 years 5 months ago
Airports for Agents: An Open MAS Infrastructure for Mobile Agents
Airports for Agents1 (AA) is an implemented distributed multi-agent infrastructure designed for dynamic and unstable Internet environment. The infrastructure consists of platforms ...
Jan Tozicka