This paper focuses on the development of a hybrid security model for Mobile Agents (MAs) system in a distributed network environment using RSA and DSA. The MA computing vulnerabilities include authentication, secure messaging, certification, trusted third parties, non-repudiation and resource control. These vulnerabilities have prevented widespread adoption of mobile agent ...Download Now
An attempt has been made in this paper to access the control layer of the General Packet Radio Service (GPRS) network Base Station (BS), using throughput optimization. The authors focus on the effect of packet transmissions on the throughput of forwardlink (downlink) power balancing, with specific interest on the relative ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?