Sciweavers

55 search results - page 7 / 11
» Mobile Agent Security with Efficient Oblivious Transfer
Sort
View
EDOC
2004
IEEE
14 years 10 days ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
SIAMCOMP
2008
154views more  SIAMCOMP 2008»
13 years 7 months ago
Cryptography in the Bounded-Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivio...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
LCN
2005
IEEE
14 years 2 months ago
Data Dissemination based on Mobile Agent in Wireless Sensor Networks
Recently, mobile agents have been proposed for efficient data dissemination in sensor networks [1-6]. In the traditional client/server-based computing architecture, data at multip...
Min Chen, Taekyoung Kwon, Yanghee Choi
DAIS
2003
13 years 10 months ago
Rational Server Selection for Mobile Agents
- Mobile agents have the ability to migrate through heterogeneous networks and execute at remote hosts. This ability can be exploited to improve the performance of agent based appl...
Carsten Pils, Stefan Diepolder
JCP
2006
112views more  JCP 2006»
13 years 8 months ago
Mobile Agent Based Wireless Sensor Networks
Recently, mobile agents have been proposed for efficient data dissemination in sensor networks. In the traditional client/server-based computing architecture, data at multiple sour...
Min Chen, Taekyoung Kwon, Yong Yuan, Victor C. M. ...