Sciweavers

1519 search results - page 229 / 304
» Authentication for Mobile Agents
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
13 years 10 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 10 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
ETT
2006
93views Education» more  ETT 2006»
13 years 10 months ago
A modular access gateway for managing intermittent connectivity in vehicular communications
The Drive-thru Internet architecture allows exploiting intermittent connectivity by temporarily connecting to IEEE 802.11 WLAN access points at the roadside from moving vehicles. T...
Jörg Ott, Dirk Kutscher
ECWEB
2005
Springer
121views ECommerce» more  ECWEB 2005»
14 years 3 months ago
Fuzzy Virtual Card Agent for Customizing Divisible Card Payments
: E-commerce customers may have a problem when paying for the purchase of a major item, if its price is larger than the available credit on their credit card. In the brick and mort...
Soon Ae Chun, Yoo Jung An, James Geller, Sunju Par...
ICTCS
2001
Springer
14 years 2 months ago
Subtyping and Matching for Mobile Objects
In [BCC00], we presented a general framework for extending calculi of mobile agents with object-oriented features, and we studied a typed instance of that model based on Cardelli a...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa