Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
EUC
2008
Springer
11 years 7 months ago
A Context Management System for Supporting Context-Aware Applications
This paper presents a context management system for supporting context-aware applications in a smart home. In a ubiquitous computing environment context changes dynamically and th...
Eunhoe Kim, Jaeyoung Choi
EUC
2008
Springer
11 years 8 months ago
Trusted Spanning Tree for Delay Tolerant MANETs
Quality of service is an important issue in Delay Tolerant Mobile Ad-Hoc Networks (DTMs). This work attempts to improve the Quality of service (QoS) in DTMs by relying on spanning...
Apivadee Piyatumrong, Pascal Bouvry, Fréd&e...
EUC
2008
Springer
11 years 8 months ago
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks
The broadcast operation is a fundamental service in wireless ad hoc networks. The na
Yu Huang 0002, Bo Liu, XianPing Tao, Jiannong Cao,...
EUC
2008
Springer
11 years 8 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
EUC
2008
Springer
11 years 8 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
EUC
2008
Springer
11 years 8 months ago
Efficient Client-to-Client Password Authenticated Key Exchange
With the rapid proliferation of client-to-client applications, PAKE (password authenticated key exchange) protocols in the client-to-client setting become increasingly important. ...
Yanjiang Yang, Feng Bao, Robert H. Deng
EUC
2008
Springer
11 years 8 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
EUC
2008
Springer
11 years 8 months ago
Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks
In this paper, we have proposed a framework of systems-on-chips clustering in application to complicated sensor networks. The framework can be applied to address the communication ...
Sharon Fan, Jeffrey Fan, Kia Makki, Niki Pissinou
EUC
2008
Springer
11 years 8 months ago
A Sanitizing Signature Scheme with Indexing
Atsushi Koide, Raylin Tso, Eiji Okamoto
books