Sciweavers

337 search results - page 21 / 68
» Security enhanced mobile agents
Sort
View
SAC
2004
ACM
14 years 3 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
MA
2001
Springer
118views Communications» more  MA 2001»
14 years 2 months ago
Dynamic Adaptation of Mobile Agents in Heterogenous Environments
Mobile agents must be prepared to execute on different hosts and therefore in different execution environments. Even when a homogenous exenvironment is offered by abstracting th...
Raimund Brandt, Helmut Reiser
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 11 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
ICPPW
2005
IEEE
14 years 3 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
ADHOCNOW
2005
Springer
14 years 3 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves