1
|
Managing distributed trust relationships for multi-modal authentication. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2018. [DOI: 10.1016/j.jisa.2018.01.003] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
2
|
Geetha D, Nalini N, Biradar RC. Agent based trusted neighbor identification in Wireless Sensor Networks. AI COMMUN 2015. [DOI: 10.3233/aic-150673] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Affiliation(s)
- D.D. Geetha
- Jain University, Bangalore, India
- Reva University, Bangalore, India. E-mails: ,
| | - N. Nalini
- Shridevi Institute of Engineering and Technology, Tumkur, India. E-mail:
| | | |
Collapse
|
3
|
|
4
|
Manvi S, Kakkasageri M. Multicast routing in mobile ad hoc networks by using a multiagent system. Inf Sci (N Y) 2008. [DOI: 10.1016/j.ins.2007.11.005] [Citation(s) in RCA: 44] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
5
|
|
6
|
|
7
|
Kim SH. An Architecture for Advanced Services in Cyberspace Through Data Mining: A Framework With Case Studies in Finance and Engineering. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2000. [DOI: 10.1207/s15327744joce1004_04] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/31/2022]
|
8
|
|
9
|
Berkovits S, Guttman JD, Swarup V. Authentication for Mobile Agents. LECTURE NOTES IN COMPUTER SCIENCE 1998. [DOI: 10.1007/3-540-68671-1_7] [Citation(s) in RCA: 31] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/01/2023]
|
10
|
Gray RS, Kotz D, Cybenko G, Rus D. D’Agents: Security in a Multiple-Language, Mobile-Agent System. LECTURE NOTES IN COMPUTER SCIENCE 1998. [DOI: 10.1007/3-540-68671-1_9] [Citation(s) in RCA: 66] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/29/2022]
|
11
|
Sander T, Tschudin CF. Protecting Mobile Agents Against Malicious Hosts. LECTURE NOTES IN COMPUTER SCIENCE 1998. [DOI: 10.1007/3-540-68671-1_4] [Citation(s) in RCA: 229] [Impact Index Per Article: 8.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/16/2022]
|
12
|
|
13
|
Security for mobile agents: Authentication and state appraisal. COMPUTER SECURITY — ESORICS 96 1996. [DOI: 10.1007/3-540-61770-1_31] [Citation(s) in RCA: 60] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/29/2022]
|