Sciweavers

901 search results - page 38 / 181
» Secure Internet Applications Based on Mobile Agents
Sort
View
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 2 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
IWCMC
2010
ACM
14 years 1 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
TRIDENTCOM
2010
IEEE
13 years 6 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
INDOCRYPT
2001
Springer
14 years 1 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
ICDCSW
2005
IEEE
14 years 2 months ago
Mobile Proxies for Proactive Buffering in Wireless Internet Multimedia Streaming
The widespread popularity of roaming wireless devices with limited and heterogeneous capabilities is enabling new challenging deployment scenarios for multimedia streaming in wire...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli