Sciweavers

181 search results - page 36 / 37
» An efficient scheme for authenticating public keys in sensor...
Sort
View
EUROPKI
2006
Springer
13 years 9 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
MOBICOM
2010
ACM
13 years 5 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
MONET
2006
139views more  MONET 2006»
13 years 5 months ago
Market Driven Dynamic Spectrum Allocation over Space and Time among Radio-Access Networks: DVB-T and B3G CDMA with Heterogeneous
The radio frequency spectrum is a naturally limited resource of extraordinary value, as the key to the provision of important communication and information services. Traditionally,...
Virgilio Rodriguez, Klaus Moessner, Rahim Tafazoll...
COMPUTER
2007
123views more  COMPUTER 2007»
13 years 5 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 5 months ago
Adaptive Demodulation in Differentially Coherent Phase Systems: Design and Performance Analysis
Adaptive Demodulation (ADM) is a newly proposed rate-adaptive system which operates without requiring Channel State Information (CSI) at the transmitter (unlike adaptive modulatio...
J. David Brown, Jamshid Abouei, Konstantinos N. Pl...