메뉴 건너뛰기




Volumn 31, Issue 1, 2009, Pages 40-47

Efficient migration for mobile computing in distributed networks

Author keywords

Access control; Distributed environment; Elliptic curve cryptosystem; Mobile agent; Mobility

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; MOBILE AGENTS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY SYSTEMS; SENSOR NETWORKS; WIRELESS NETWORKS;

EID: 54349095337     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2007.10.011     Document Type: Article
Times cited : (27)

References (18)
  • 1
    • 0035917655 scopus 로고    scopus 로고
    • Mobile agents: an introduction
    • Gian P.P. Mobile agents: an introduction. Microprocessors and Microsystems 25 2 (2001) 65-74
    • (2001) Microprocessors and Microsystems , vol.25 , Issue.2 , pp. 65-74
    • Gian, P.P.1
  • 2
    • 33747586736 scopus 로고    scopus 로고
    • Protecting mobile-agent data collection against blocking attacks
    • Shao M.H., and Zhou J. Protecting mobile-agent data collection against blocking attacks. Computer Standards & Interfaces 28 5 (2006) 600-611
    • (2006) Computer Standards & Interfaces , vol.28 , Issue.5 , pp. 600-611
    • Shao, M.H.1    Zhou, J.2
  • 3
    • 33747812111 scopus 로고    scopus 로고
    • A timed mobile agent planning approach for distributed information retrieval in dynamic network environments
    • Baek J.W., and Yeom H.Y. A timed mobile agent planning approach for distributed information retrieval in dynamic network environments. Information Sciences 176 22 (2006) 3347-3378
    • (2006) Information Sciences , vol.176 , Issue.22 , pp. 3347-3378
    • Baek, J.W.1    Yeom, H.Y.2
  • 4
    • 33750514384 scopus 로고    scopus 로고
    • Mobile agents for information retrieval in hybrid simulation environment
    • Lu T., and Hsu C. Mobile agents for information retrieval in hybrid simulation environment. Journal of Network and Computer Applications 30 1 (2007) 244-264
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 244-264
    • Lu, T.1    Hsu, C.2
  • 5
    • 14844336430 scopus 로고    scopus 로고
    • A new reverse auction agent system for M-commerce using mobile agents
    • Shih D.H., Huang S.Y., and Yen D.C. A new reverse auction agent system for M-commerce using mobile agents. Computer Standards & Interfaces 27 4 (2005) 383-395
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.4 , pp. 383-395
    • Shih, D.H.1    Huang, S.Y.2    Yen, D.C.3
  • 7
    • 33746169048 scopus 로고    scopus 로고
    • Secure brokerage mechanisms for mobile electronic commerce
    • Esparza O., Muñoz J.L., Soriano M., and Forné J. Secure brokerage mechanisms for mobile electronic commerce. Computer Communications 29 12 (2006) 2308-2321
    • (2006) Computer Communications , vol.29 , Issue.12 , pp. 2308-2321
    • Esparza, O.1    Muñoz, J.L.2    Soriano, M.3    Forné, J.4
  • 9
    • 33646842835 scopus 로고    scopus 로고
    • HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems
    • Orgun B., and Vu J. HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems. Computers in Biology and Medicine 36 7-8 (2006) 817-836
    • (2006) Computers in Biology and Medicine , vol.36 , Issue.7-8 , pp. 817-836
    • Orgun, B.1    Vu, J.2
  • 11
    • 0032122780 scopus 로고    scopus 로고
    • Mobile software agents for telecommunications
    • Karmouch A. Mobile software agents for telecommunications. IEEE Communications Magazine 36 7 (1998) 24-25
    • (1998) IEEE Communications Magazine , vol.36 , Issue.7 , pp. 24-25
    • Karmouch, A.1
  • 14
    • 0032121340 scopus 로고    scopus 로고
    • Access control and key management for mobile agents
    • Volker R., and Mehrdad J.S. Access control and key management for mobile agents. Computers & Graphics (Pergamon) 22 4 (1998) 457-461
    • (1998) Computers & Graphics (Pergamon) , vol.22 , Issue.4 , pp. 457-461
    • Volker, R.1    Mehrdad, J.S.2
  • 15
    • 32644451622 scopus 로고    scopus 로고
    • A new solution for assigning cryptographic keys to control access in mobile agent environments
    • Chang C.C., and Lin I.C. A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6 1 (2006) 137-146
    • (2006) Wireless Communications and Mobile Computing , vol.6 , Issue.1 , pp. 137-146
    • Chang, C.C.1    Lin, I.C.2
  • 16
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography, advances in cryptology: proceedings of Crypto '85
    • Miller V.S. Use of elliptic curves in cryptography, advances in cryptology: proceedings of Crypto '85. Lecture Notes in Computer Science vol. 218 (1986) 417-426
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 17
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 48 177 (1987) 203-209
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.