Secure communication of medical information using mobile agents

M Nikooghadam, A Zakerolhosseini - Journal of medical systems, 2012 - Springer
Recently several efficient schemes are proposed to provide security of e-medicine systems.
Almost all of these schemes have tried to achieve the highest security level in transmission …

Efficient access control and key management schemes for mobile agents

IC Lin, HH Ou, MS Hwang - Computer Standards & Interfaces, 2004 - Elsevier
The mobile agent is a promising trend of technology. It is designed for roaming around the
Internet and to achieve the goal of autonomy. However, the Internet is an open and, in many …

Secure transmission of mobile agent in dynamic distributed environments

A Zakerolhosseini, M Nikooghadam - Wireless Personal Communications, 2013 - Springer
Huang et al. has recently proposed an efficient key management and access control scheme
for mobile agent environments based on Elliptic Curve Cryptosystem (ECC). Although their …

Improved migration for mobile computing in distributed networks

CL Hsu, YL Lin - Computer Standards & Interfaces, 2014 - Elsevier
A mobile ad hoc network (MANET) is a special type of wireless network in which a collection
of mobile nodes with wireless network interfaces may form a temporary network, without the …

An efficient key management scheme for mobile agents in distributed networks

M Nikooghadam, F Safaei… - 2010 First International …, 2010 - ieeexplore.ieee.org
In recent years, the Elliptic Curve Cryptosystem (ECC) has attracted a great deal of attention
due to its advantages. In this paper, a new ECC based scheme in a hierarchical mobile …

A novel key management and access control scheme for mobile agent

JY Pan, TL Chen, TS Chen - … on Intelligent Computing, ICIC 2006 Kunming …, 2006 - Springer
The speed and convenience of the Internet facilitated the development of electronic
commerce (e-commerce). E-commerce research and technologies have always drawn the …

A method of encircle tactic based on geometric analysis in pursuit-evasion games

M Lei, Q Yin, X Yao - 2016 IEEE International Conference on …, 2016 - ieeexplore.ieee.org
In multi-agent system like the pursuit-evasion games (PEGs), when the pursuer tries to
capture the evader by encircling it, there should be a method to determine whether the …

[CITATA][C] A Noval Key Management and Access Control Method for Mobile Agent

T Chen - Master's Thesis, Institute of Communicational …, 2006

[CITATA][C] A Novel Key Management and Access Control Method for Mobile Agents

TL Chen - 2006