A new solution for assigning cryptographic keys to control access in mobile agent environments.
Chin-Chen ChangIuon-Chang LinPublished in: Wirel. Commun. Mob. Comput. (2006)
Keyphrases
- mobile agents
- client server
- computing environments
- distributed computing
- distributed systems
- mobile environments
- load balancing
- mobile agent technology
- middleware architecture
- fault tolerance
- control system
- distributed data mining
- mobile computing
- network management
- hash functions
- mobile agent system
- smart card
- agent technology
- mobile devices
- wireless networks
- central processor