This paper presents auto-networking technologies for IPv6 mobile ad hoc networks. The auto-networking technologies consist of IPv6 unicast address autoconfiguration, IPv6 multicas...
We advocate the use of agents to model a system that allows us to integrate and protect information stored in both mobile and fixed devices, while trying to preserve a consistent a...
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program st...
Wearable computing devices are obviously made all the more powerful due to their ability to be innately mobile. With this in mind, spontaneous peer-to-peer networks may emerge amo...