Sciweavers

1519 search results - page 266 / 304
» Authentication for Mobile Agents
Sort
View
CDC
2010
IEEE
124views Control Systems» more  CDC 2010»
13 years 4 months ago
Underactuated control and distribution of multi-agent systems in stratified flow environments
The present paper shows how vertical actuation alone may be used to effectively control the spatial distribution of mobile vehicles ("balloons" in air, or "drifters&...
Robert H. Krohn, Thomas R. Bewley
TALG
2011
98views more  TALG 2011»
13 years 4 months ago
Tree exploration with logarithmic memory
We consider the task of network exploration by a mobile agent (robot) with small memory. The agent has to traverse all nodes and edges of a network (represented as an undirected c...
Christoph Ambühl, Leszek Gasieniec, Andrzej P...
ACSAC
2005
IEEE
14 years 3 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
JSAC
2006
156views more  JSAC 2006»
13 years 9 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
APNOMS
2009
Springer
14 years 4 months ago
A Scheme for Supporting Optimal Path in 6LoWPAN Based MANEMO Networks
In this paper, we focus on the scheme for the route optimization in 6LoWPAN based MANEMO environments. If 6LoWPAN mobile routers for supporting NEMO protocol are organized by neste...
Jin Ho Kim, Choong Seon Hong