Sciweavers

1612 search results - page 220 / 323
» About models of security protocols
Sort
View
UM
2005
Springer
15 years 3 months ago
Modeling Agents That Exhibit Variable Performance in a Collaborative Setting
In a collaborative environment, knowledge about collaborators’ skills is an important factor when determining which team members should perform a task. However, this knowledge ma...
Ingrid Zukerman, Christian Guttmann
TELSYS
2010
174views more  TELSYS 2010»
14 years 4 months ago
Modelling the energy cost of a fully operational wireless sensor network
Abstract Several applications have been proposed for Wireless sensor networks, including habitat monitoring, structural health monitoring, pipeline monitoring, precision agricultur...
Waltenegus Dargie, Xiaojuan Chao, Mieso K. Denko
GLOBECOM
2009
IEEE
15 years 1 months ago
A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model
—In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others and becomes one of the challenges in the design of protocols fo...
Dejun Yang, Xi Fang, Nan Li, Guoliang Xue
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
15 years 10 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
AINA
2005
IEEE
15 years 3 months ago
A Scheme for Testing Privacy State in Pervasive Sensor Networks
More and more sensor networks will be deployed in the place where people are living, studying, and working. These sensor networks bring us the convenience of accessing information...
Yingpeng Sang, Hong Shen