Sciweavers

644 search results - page 50 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
STORAGESS
2005
ACM
14 years 2 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
PERCOM
2009
ACM
14 years 9 months ago
Proactive and Adaptive Fuzzy Profile Control for Mobile Phones
In this paper we describe a context-sensitive way to change an active mobile phone profile. We present a method to create a proactive and adaptive phone profile control system that...
Miika Valtonen, Antti-Matti Vainio, Jukka Vanhala
APNOMS
2006
Springer
14 years 8 days ago
NETSAQ: Network State Adaptive QoS Provisioning for MANETs
The provision of ubiquitous services in Mobile Ad-hoc Networks (MANETs) is a great challenge, considering the bandwidth, mobility, and computational-resources constraints exhibited...
Shafique Ahmad Chaudhry, Faysal Adeem Siddiqui, Al...
ACSAC
2001
IEEE
14 years 5 days ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
ATAL
2006
Springer
13 years 10 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate