Sciweavers

644 search results - page 5 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
GLOBECOM
2008
IEEE
14 years 1 months ago
A Mobility Prediction-Based Adaptive Data Gathering Protocol for Delay Tolerant Mobile Sensor Network
— The basic operation of Delay Tolerant Mobile Sensor Network (DTMSN) is for pervasive data gathering in networks with intermittent connectivity, where traditional data gathering...
Jinqi Zhu, Jiannong Cao, Ming Liu, Yuan Zheng, Hai...
ECOOPW
1999
Springer
13 years 11 months ago
Mutual Protection of Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and op...
Volker Roth
COMPSAC
2009
IEEE
14 years 1 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
ISW
2004
Springer
14 years 2 days ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 6 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan