Sciweavers

1519 search results - page 237 / 304
» Authentication for Mobile Agents
Sort
View
MA
2000
Springer
104views Communications» more  MA 2000»
14 years 1 months ago
Portable Support for Transparent Thread Migration in Java
In this paper, we present a mechanism to capture and reestablish the state of Java threads. We achieve this by extracting a thread's execution state from the application code ...
Eddy Truyen, Bert Robben, Bart Vanhaute, Tim Conin...
PERCOM
2005
ACM
14 years 9 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
CIMCA
2008
IEEE
13 years 11 months ago
Portlets-Based Portal for an E-learning Grid
This paper describes a portlet-based portal that provides user interfaces for access a Grid-based elearning platform. E-learning platforms that exploit resources and computing pow...
Felicia Ionescu, Cristina Elena Stoica, Mircea Dea...
ISSA
2004
13 years 11 months ago
Propagating Trust In The Web Services Framework
In this paper, we discuss one possible way of establishing trust between a user entity and a web service. We will assume that the user entity is machine-based (i.e. some software,...
Anitta Thomas
SIGOPS
2002
69views more  SIGOPS 2002»
13 years 9 months ago
On the value of threshold signatures
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. The purpose of this paper is to present a rather simple alternative to threshol...
Niklas Borselius, Chris J. Mitchell, Aaron Wilson