Sciweavers

901 search results - page 159 / 181
» Secure Internet Applications Based on Mobile Agents
Sort
View
BCEC
1997
13 years 8 months ago
Adaptive Task Allocation Inspired by a Model of Division of Labor in Social Insects
Social insects provide us with a powerful metaphor to create decentralized systems of simple interacting, and often mobile, agents. The emergent collective intelligence of social i...
Eric Bonabeau, Andrej Sobkowski, Guy Theraulaz, Je...
CCS
2006
ACM
13 years 11 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
AVBPA
2005
Springer
266views Biometrics» more  AVBPA 2005»
14 years 1 months ago
A Hybrid Swipe Fingerprint Mosaicing Scheme
Due to their very small contact areas and low cost, swipe fingerprint sensors provide the very convenient and reliable fingerprint security solutions and are being increasingly u...
Yongliang Zhang, Jie Yang, Hongtao Wu
CCGRID
2002
IEEE
14 years 15 days ago
Invisible Network: Concepts and Architecture
Efficient schemes for deploying and maintaining widearea services and accessing such services are essential if the Internet is to sustain itself as the communication medium for b...
Muthucumaru Maheswaran, Balasubramaneyam Maniymara...
SIGOPSE
2000
ACM
13 years 12 months ago
Multiprocessing and portability for PDAs
The role of small devices in the emerging all-connected computer infrastructure is growing. So are the requirements that the application execution environments face. Portability, ...
Grzegorz Czajkowski