Sciweavers

23 search results - page 3 / 5
» A Conference Key Distribution Scheme Using Interpolating Pol...
Sort
View
INFOCOM
2006
IEEE
13 years 11 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
SSDBM
2008
IEEE
146views Database» more  SSDBM 2008»
14 years 4 days ago
Kriging for Localized Spatial Interpolation in Sensor Networks
Abstract. The presence of coverage holes can adversely affect the accurate representation of natural phenomena being monitored by a Wireless Sensor Network (WSN). Current WSN resea...
Muhammad Umer, Lars Kulik, Egemen Tanin
IPPS
1997
IEEE
13 years 9 months ago
Designing Efficient Distributed Algorithms Using Sampling Techniques
In this paper we show the power of sampling techniques in designing efficient distributed algorithms. In particular, we show that using sampling techniques, on some networks, sele...
Sanguthevar Rajasekaran, David S. L. Wei
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
13 years 12 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
CORR
2006
Springer
123views Education» more  CORR 2006»
13 years 5 months ago
Counting good truth assignments of random k-SAT formulae
We present a deterministic approximation algorithm to compute logarithm of the number of `good' truth assignments for a random k-satisfiability (k-SAT) formula in polynomial ...
Andrea Montanari, Devavrat Shah