Sciweavers

243 search results - page 40 / 49
» Secure mobile agent systems using Java: where are we heading
Sort
View
112
Voted
ICNS
2006
IEEE
15 years 9 months ago
Proposal for compilation techniques of monitoring tasks to improve applications management performance
The emergence of middleware solutions and new services, even on small devices, will need adapted distributed management solutions which address these specificities, both in terms ...
Bernard Kaddour, Joël Quinqueton
CCS
2007
ACM
15 years 7 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
CSREASAM
2006
15 years 4 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
130
Voted
AAAI
2010
15 years 4 months ago
Collaborative Filtering Meets Mobile Recommendation: A User-Centered Approach
With the increasing popularity of location tracking services such as GPS, more and more mobile data are being accumulated. Based on such data, a potentially useful service is to m...
Vincent Wenchen Zheng, Bin Cao, Yu Zheng, Xing Xie...
ATAL
2005
Springer
15 years 9 months ago
Formalising trust for online communities
Provision of services within a virtual framework for resource sharing across institutional boundaries has become an active research area. Many such services encode access to compu...
Ali Shaikh Ali, Omer F. Rana