Secure communication of medical information using mobile agents
Recently several efficient schemes are proposed to provide security of e-medicine systems.
Almost all of these schemes have tried to achieve the highest security level in transmission …
Almost all of these schemes have tried to achieve the highest security level in transmission …
Efficient access control and key management schemes for mobile agents
The mobile agent is a promising trend of technology. It is designed for roaming around the
Internet and to achieve the goal of autonomy. However, the Internet is an open and, in many …
Internet and to achieve the goal of autonomy. However, the Internet is an open and, in many …
Secure transmission of mobile agent in dynamic distributed environments
Huang et al. has recently proposed an efficient key management and access control scheme
for mobile agent environments based on Elliptic Curve Cryptosystem (ECC). Although their …
for mobile agent environments based on Elliptic Curve Cryptosystem (ECC). Although their …
Improved migration for mobile computing in distributed networks
CL Hsu, YL Lin - Computer Standards & Interfaces, 2014 - Elsevier
A mobile ad hoc network (MANET) is a special type of wireless network in which a collection
of mobile nodes with wireless network interfaces may form a temporary network, without the …
of mobile nodes with wireless network interfaces may form a temporary network, without the …
An efficient key management scheme for mobile agents in distributed networks
In recent years, the Elliptic Curve Cryptosystem (ECC) has attracted a great deal of attention
due to its advantages. In this paper, a new ECC based scheme in a hierarchical mobile …
due to its advantages. In this paper, a new ECC based scheme in a hierarchical mobile …
A novel key management and access control scheme for mobile agent
The speed and convenience of the Internet facilitated the development of electronic
commerce (e-commerce). E-commerce research and technologies have always drawn the …
commerce (e-commerce). E-commerce research and technologies have always drawn the …
A method of encircle tactic based on geometric analysis in pursuit-evasion games
M Lei, Q Yin, X Yao - 2016 IEEE International Conference on …, 2016 - ieeexplore.ieee.org
In multi-agent system like the pursuit-evasion games (PEGs), when the pursuer tries to
capture the evader by encircling it, there should be a method to determine whether the …
capture the evader by encircling it, there should be a method to determine whether the …
[CITATA][C] A Noval Key Management and Access Control Method for Mobile Agent
T Chen - Master's Thesis, Institute of Communicational …, 2006
[CITATA][C] A Novel Key Management and Access Control Method for Mobile Agents
TL Chen - 2006