Sciweavers

77 search results - page 12 / 16
» Protecting Mobile Agents Against Malicious Hosts
Sort
View
GLOBECOM
2009
IEEE
13 years 4 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu
WS
2006
ACM
14 years 20 days ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
ATAL
2006
Springer
13 years 10 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
JNCA
2010
94views more  JNCA 2010»
13 years 5 months ago
Distributed autonomic management: An approach and experiment towards managing service-centric networks
This paper describes a novel approach for managing service-centric communications networks called distributed autonomic management (DAM). Current approaches to network management ...
Pradeep Ray, Nandan Parameswaran, Lundy Lewis
WWW
2011
ACM
13 years 1 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill