Sciweavers

1519 search results - page 218 / 304
» Authentication for Mobile Agents
Sort
View
IDEAL
2007
Springer
14 years 4 months ago
Extracting Meaningful Contexts from Mobile Life Log
Life logs include people's experiences collected from various sources. It is used to support user's memory. There are many studies that collect and store life log for per...
Youngseol Lee, Sung-Bae Cho
ATAL
2010
Springer
13 years 11 months ago
Decentralized hash tables for mobile robot teams solving intra-logistics tasks
Although a remarkably high degree of automation has been reached in production and intra-logistics nowadays, human labor is still used for transportation using handcarts and forkl...
D. Sun, A. Kleiner, Christian Schindelhauer
ISCAS
2008
IEEE
154views Hardware» more  ISCAS 2008»
14 years 4 months ago
A 6.3nJ/op low energy 160-bit modulo-multiplier for elliptic curve cryptography processor
— A low energy modulo-multiplier is proposed for elliptic curve cryptography (ECC) processor, especially for authentication in mobile device or key encryption in embedded health-...
Hyejung Kim, Yongsang Kim, Hoi-Jun Yoo
ICNP
2007
IEEE
14 years 4 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik
ACSC
2005
IEEE
14 years 3 months ago
SuperstringRep: Reputation-enhanced Service Discovery
1 Service discovery protocols are used in distributed systems to locate services for clients. The services that are located as well as the clients requesting service are commonly a...
Ryan Wishart, Ricky Robinson, Jadwiga Indulska