Sciweavers

505 search results - page 101 / 101
» Message from General Co-Chairs
Sort
View
CCS
2003
ACM
13 years 10 months ago
A pairwise key pre-distribution scheme for wireless sensor networks
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication pu...
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod ...
IPSN
2003
Springer
13 years 10 months ago
A Distributed Algorithm for Waking-up in Heterogeneous Sensor Networks
In this paper we present a distributed, application-morphable, algorithm for waking up appropriate sensor nodes in a heterogeneous sensor network. We assume a sensor field consisti...
Akis Spyropoulos, Cauligi S. Raghavendra, Viktor K...
SAC
2009
ACM
13 years 9 months ago
Fast networking with socket-outsourcing in hosted virtual machine environments
This paper proposes a novel method of achieving fast networking in hosted virtual machine (VM) environments. This method, called socket-outsourcing, replaces the socket layer in a...
Hideki Eiraku, Yasushi Shinjo, Calton Pu, Younggyu...
ACSAC
2000
IEEE
13 years 9 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
KDD
2007
ACM
149views Data Mining» more  KDD 2007»
14 years 5 months ago
Distributed classification in peer-to-peer networks
This work studies the problem of distributed classification in peer-to-peer (P2P) networks. While there has been a significant amount of work in distributed classification, most o...
Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi