[HTML][HTML] Classification and review of security schemes in mobile computing

SA Kumar - Wireless Sensor Network, 2010 - scirp.org
In this paper, we present the classification and review of security schemes in mobile
computing system. We classify these schemes based on types the infrastructure used in the …

[PDF][PDF] A survey: agent-based software technology under the eyes of cyber security, security controls, attacks and challenges

B Alluhaybi, MS Alrahhal, A Alzhrani… - … Journal of Advanced …, 2019 - researchgate.net
Recently, agent-based software technology has received wide attention by the research
community due to its valuable benefits, such as reducing the load on networks and providing …

A comprehensive resource management framework for next generation wireless networks

J Ye, J Hou, S Papavassiliou - IEEE Transactions on Mobile …, 2002 - ieeexplore.ieee.org
We propose an integrated resource management approach that can be implemented in next
generation wireless networks that support multimedia services (data, voice, video, etc.) …

Design of the Ajanta system for mobile agent programming

AR Tripathi, NM Karnik, T Ahmed, RD Singh… - Journal of Systems and …, 2002 - Elsevier
We describe the architecture and programming environment of Ajanta, a Java-based system
for programming applications using mobile agents over the Internet. Agents are mobile …

Secure communication of medical information using mobile agents

M Nikooghadam, A Zakerolhosseini - Journal of medical systems, 2012 - Springer
Recently several efficient schemes are proposed to provide security of e-medicine systems.
Almost all of these schemes have tried to achieve the highest security level in transmission …

Experiences and future challenges in mobile agent programming

AR Tripathi, T Ahmed, NM Karnik - Microprocessors and Microsystems, 2001 - Elsevier
The current research in mobile agent systems has demonstrated the utility of this paradigm
in building a wide range of distributed applications and systems. In this paper, we present …

Efficient migration for mobile computing in distributed networks

KH Huang, YF Chung, CH Liu, F Lai… - Computer Standards & …, 2009 - Elsevier
The speed and convenience of the Internet makes it advantageous to online applications.
Basing on the elliptic curve cryptosystem, this study proposes a hierarchical mobile agent …

Paradigms for mobile agent based active monitoring of network systems

A Tripathi, T Ahmed, S Pathak… - NOMS 2002. IEEE …, 2002 - ieeexplore.ieee.org
We present here a framework together with a set of paradigms for mobile agent based active
monitoring of network systems. In our framework mobile agents are used to perform remote …

Efficient access control and key management schemes for mobile agents

IC Lin, HH Ou, MS Hwang - Computer Standards & Interfaces, 2004 - Elsevier
The mobile agent is a promising trend of technology. It is designed for roaming around the
Internet and to achieve the goal of autonomy. However, the Internet is an open and, in many …

A study on agent-based secure scheme for electronic medical record system

TL Chen, YF Chung, FYS Lin - Journal of medical systems, 2012 - Springer
Patient records, including doctors' diagnoses of diseases, trace of treatments and patients'
conditions, nursing actions, and examination results from allied health profession …