Sciweavers

60 search results - page 5 / 12
» A Pessimistic Approach to Trust in Mobile Agent Platforms
Sort
View
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 9 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
TRUST
2010
Springer
14 years 16 days ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
CCIA
2006
Springer
13 years 11 months ago
Improving the Team-work in Heterogeneous Multi-agent Systems: Situation Matching Approach
: This paper presents a method called "Situation Matching" that aids to improve cooperative tasks in heterogeneous multi-agent systems. The situation matching (SM) above ...
Salvador Ibarra, Christian G. Quintero, Díd...
DSOM
2000
Springer
13 years 11 months ago
Evaluation of Constrained Mobility for Programmability in Network Management
In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobilit...
Christos Bohoris, Antonio Liotta, George Pavlou
WETICE
1998
IEEE
13 years 11 months ago
Using Components for Modeling Intelligent and Collaborative Mobile Agents
Intelligence, collaboration and mobility are the main important features in designing agents for electronic commercial systems. But very few systems permit to implement agents whi...
Min-Jung Woo, Jean-Pierre Briot, Jacques Ferber