Sciweavers

501 search results - page 19 / 101
» Access control and key management for mobile agents
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
NETWORK
2008
94views more  NETWORK 2008»
13 years 7 months ago
A Survey of Mobility Management in Hybrid Wireless Mesh Networks
Mobility management is vital for realizing large-scale wireless mesh networks to provide cost-effective broadband Internet access. Although a considerable amount of research on mo...
Jiang Xie, Xudong Wang
BROADNETS
2005
IEEE
14 years 1 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
COOPIS
2004
IEEE
13 years 11 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian
JIRS
2000
133views more  JIRS 2000»
13 years 7 months ago
Managing Complexity in Large Learning Robotic Systems
Abstract. Autonomous learning systems of significant complexity often consist of several interacting modules or agents. These modules collaborate to produce a system which, when vi...
Kynan Eng, Alec P. Robertson, Deane R. Blackman