Sciweavers

1216 search results - page 4 / 244
» Self-Protected Mobile Agents
Sort
View
ISCIS
2005
Springer
14 years 4 months ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan
WOA
2010
13 years 8 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
IAT
2005
IEEE
14 years 4 months ago
Dynamic Determination of the Itinerary of Mobile Agents with Timing Constraints
The mobile agent technology is an important research area in the scope of code mobility. As part of an agent mission objective, it may exist the necessity of meeting an end-to-end...
Luciana Rech, Rômulo Silva de Oliveira, Carl...
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 4 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
WAIM
2005
Springer
14 years 4 months ago
Simulating a Finite State Mobile Agent System
This paper analyzes the simulation of Finite State mobile agent, which regards the migration, execution, and searching of the mobile agents as finite states. As the finite state mo...
Yong Liu, Congfu Xu, Yanyu Chen, Yunhe Pan