Security of mobile agent platforms using access control and cryptography

H Idrissi, EM Souidi, A Revel - … and Multi-Agent Systems: Technologies and …, 2015 - Springer
Mobile Agents are autonomous software entities able to move from one host to another.
However, this mobility is not all the time safe, as a hosting platform may receive agents with …

Anonymous ECC-authentication and intrusion detection based on execution tracing for mobile agent security

H Idrissi - Wireless Personal Communications, 2017 - Springer
Mobile agents are software entities able to move from one host to another across networks.
They are autonomous and independent from the environment where they are hosted, as …

Cubic Bezier curve approach for automated offline signature verification with intrusion identification

A Vijayaragavan, J Visumathi… - Mathematical …, 2014 - Wiley Online Library
Authentication is a process of identifying person's rights over a system. Many authentication
types are used in various systems, wherein biometrics authentication systems are of a …

An Enhanced Machine Learning Security Algorithm for the Anonymous user Detection in Ultra Dense 5G Cloud Networks

T Birhanu, KRNK Kumar… - 2023 International …, 2023 - ieeexplore.ieee.org
In general, high-density network services have a large number of users. This is seen as the
main problem of that network. As users increase, so does the amount of service provided to …

[PDF][PDF] An Enhanced Machine Learning Security Algorithm for the Anonymous user Detection in Ultra Dense 5G Cloud Networks

P Ramesh Babu, E Nekemte, M Gadiparthi, A Ababa… - researchgate.net
In general, high-density network services have a large number of users. This is seen as the
main problem of that network. As users increase, so does the amount of service provided to …

[PDF][PDF] Type based vital memory access in specific shielded mobile agent

V Arun, KL Shunmuganathan - International Conference on …, 2013 - conference.bonfring.org
Mobile computing ensures the portable flexibility for the mobile devices. Various services
and application are provided for these devices for entertainment and other aspects. But the …