Security of mobile agent platforms using access control and cryptography
H Idrissi, EM Souidi, A Revel - … and Multi-Agent Systems: Technologies and …, 2015 - Springer
Mobile Agents are autonomous software entities able to move from one host to another.
However, this mobility is not all the time safe, as a hosting platform may receive agents with …
However, this mobility is not all the time safe, as a hosting platform may receive agents with …
Anonymous ECC-authentication and intrusion detection based on execution tracing for mobile agent security
H Idrissi - Wireless Personal Communications, 2017 - Springer
Mobile agents are software entities able to move from one host to another across networks.
They are autonomous and independent from the environment where they are hosted, as …
They are autonomous and independent from the environment where they are hosted, as …
Cubic Bezier curve approach for automated offline signature verification with intrusion identification
Authentication is a process of identifying person's rights over a system. Many authentication
types are used in various systems, wherein biometrics authentication systems are of a …
types are used in various systems, wherein biometrics authentication systems are of a …
An Enhanced Machine Learning Security Algorithm for the Anonymous user Detection in Ultra Dense 5G Cloud Networks
T Birhanu, KRNK Kumar… - 2023 International …, 2023 - ieeexplore.ieee.org
In general, high-density network services have a large number of users. This is seen as the
main problem of that network. As users increase, so does the amount of service provided to …
main problem of that network. As users increase, so does the amount of service provided to …
[PDF][PDF] An Enhanced Machine Learning Security Algorithm for the Anonymous user Detection in Ultra Dense 5G Cloud Networks
P Ramesh Babu, E Nekemte, M Gadiparthi, A Ababa… - researchgate.net
In general, high-density network services have a large number of users. This is seen as the
main problem of that network. As users increase, so does the amount of service provided to …
main problem of that network. As users increase, so does the amount of service provided to …
[PDF][PDF] Type based vital memory access in specific shielded mobile agent
Mobile computing ensures the portable flexibility for the mobile devices. Various services
and application are provided for these devices for entertainment and other aspects. But the …
and application are provided for these devices for entertainment and other aspects. But the …