Font Size: a A A

The Security Of Mobile Agent-based Transmission Systems

Posted on:2012-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:T TanFull Text:PDF
GTID:2248330377452758Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of the computer network and application ofnetwork and computer, people rely more and bigger. At present, the Internet hasbecome the world’s largest, the most extensive user influence of network. It all overthe world180countries, including more than60million networks, to provide userswith all kinds of information services, and education, scientific research, businessspread with social information the main channel. It enriches people’s cultural lifewords, satisfying the people growing information needs. The convenient of networkboth for people to save time, and also to improve the working efficiency. People areenjoying the convenient network brings, but also on how to ensure the data passing inthe network is safe and reliable? Would someone to steal the important material? Andother network security problems, this paper put forward the demand. To solve theseproblems is one of the important methods of encrypted data transmission. These newtechnologies and new applications to produce in turn network and its system structureare put forward new requirements and challenges. Network security issues, also moreand more attention. Therefore, how to improve the network application performanceand reduce the network load and improve online resources utilization becomes theimportant research topic of computer technology. A new calculation model-mobileAgent of calculation mode of become the most promising computation mode. MobileAgent is an independent, identifiable computer programs, it can independently inheterogeneous network according to certain rules on mobile, looking for the rightcomputing resources, information resources and software resources, use and theseresources with the host computer advantage processing or use these resources, onbehalf of the user to perform a specific task...
Keywords/Search Tags:mobile Agent, Aglets, Secure transmission, distributed computation
PDF Full Text Request
Related items