Sciweavers

193 search results - page 6 / 39
» Universally Composable Secure Mobile Agent Computation
Sort
View
ICALP
2000
Springer
13 years 11 months ago
One-Round Secure Computation and Secure Autonomous Mobile Agents
d Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M
Christian Cachin, Jan Camenisch, Joe Kilian, Joy M...
AAAI
2012
11 years 10 months ago
Computing Game-Theoretic Solutions and Applications to Security
The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorith...
Vincent Conitzer
IMCSIT
2010
13 years 5 months ago
Selected Security Aspects of Agent-based Computing
The paper presents selected security aspects related to confidentiality, privacy, trust and authenticity issues of a distributed, agent-based computing. Particular attention has be...
Mariusz R. Matuszek, Piotr Szpryngier
MSWIM
2005
ACM
14 years 1 months ago
Cellular universal IP: a low delay mobility scheme based on universal IP addressing
The concept of care-of-address (CoA) is a major cause of excessive handoff delay in Mobile IPv6 for real time multimedia traffic. Many schemes eliminate the use of CoA at the micr...
Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 1 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...