Sciweavers

31 search results - page 2 / 7
» euc 2008
Sort
View
EUC
2008
Springer
13 years 6 months ago
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks
The broadcast operation is a fundamental service in wireless ad hoc networks. The na
Yu Huang 0002, Bo Liu, XianPing Tao, Jiannong Cao,...
EUC
2008
Springer
13 years 6 months ago
Efficient Client-to-Client Password Authenticated Key Exchange
With the rapid proliferation of client-to-client applications, PAKE (password authenticated key exchange) protocols in the client-to-client setting become increasingly important. ...
Yanjiang Yang, Feng Bao, Robert H. Deng
EUC
2008
Springer
13 years 6 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
EUC
2008
Springer
13 years 6 months ago
UMDD: User Model Driven Software Development
The existing software engineering seldom considers software usability, and Human-Computer Interaction (HCI) techniques which can improve the software usability cannot guarantee de...
Xiaochun Wang, Yuanchun Shi
EUC
2008
Springer
13 years 6 months ago
Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors
This paper presents real-time scheduling techniques for reducing the response time of aperiodic tasks scheduled with real-time periodic tasks on multiprocessor systems. Two proble...
Shinpei Kato, Nobuyuki Yamasaki