Sciweavers

901 search results - page 74 / 181
» Secure Internet Applications Based on Mobile Agents
Sort
View
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 2 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
ACSAC
2009
IEEE
14 years 3 months ago
HIMA: A Hypervisor-Based Integrity Measurement Agent
Abstract—Integrity measurement is a key issue in building trust in distributed systems. A good solution to integrity measurement has to provide both strong isolation between the ...
Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan ...
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
13 years 8 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
TRIDENTCOM
2006
IEEE
14 years 2 months ago
CMT II: An agent based framework for comprehensive IP measurements
— The Communication Measurement Tool II (CMT II) is a framework for comprehensive IP measurements. It is the next development stage of the succeeded measurement framework called ...
Thomas Pfeiffenberger, Thomas Fichtel
ESAW
2001
Springer
14 years 1 months ago
Engineering Infrastructures for Mobile Organizations
Mobile application components can be effectively and uniformly modeled in terms of autonomous agents moving across different context during execution. In this paper, we introduce a...
Giacomo Cabri, Letizia Leonardi, Marco Mamei, Fran...