Sciweavers

319 search results - page 49 / 64
» A Trustworthy Mobile Agent Infrastructure for Network Manage...
Sort
View
CLUSTER
2004
IEEE
13 years 7 months ago
Resource Management for Ad-Hoc Wireless Networks with Cluster Organization
Boosted by technology advancements, government and commercial interest, ad-hoc wireless networks are emerging as a serious platform for distributed mission-critical applications. G...
Ionut Cardei, Srivatsan Varadarajan, Allalaghatta ...
ISCC
2002
IEEE
111views Communications» more  ISCC 2002»
14 years 10 days ago
How to support Internet-based distribution of video on demand to portable devices
The increasing diffusion of mobile computing and of portable devices with wireless connectivity identifies new challenging scenarios for service provisioning. The access from devi...
Paolo Bellavista, Antonio Corradi
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
MOBICOM
2005
ACM
14 years 29 days ago
MoB: a mobile bazaar for wide-area wireless services
We introduce MoB, an infrastructure for collaborative wide-area wireless data services. MoB proposes to change the current model of data services in the following fundamental ways...
Rajiv Chakravorty, Sulabh Agarwal, Suman Banerjee,...
ICALP
2003
Springer
14 years 19 days ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...