Sciweavers

901 search results - page 17 / 181
» Secure Internet Applications Based on Mobile Agents
Sort
View
SAC
2003
ACM
14 years 1 months ago
Enabling Mobile Agents to Dynamically Assume Roles
Agent-based application development must face the issues related to the interactions among agents. In fact, their sociality allows decomposing large applications into collaboratin...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 10 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
ATAL
2004
Springer
14 years 2 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz
ISJGP
2007
146views more  ISJGP 2007»
13 years 8 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...