Sciweavers

644 search results - page 57 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
ISPAN
1999
IEEE
15 years 4 months ago
Location Updates and Probabilistic Tracking Algorithms for Mobile Cellular Networks
In this work, we develop a novel mathematical model to analyze di erent location update protocols for mobile cellular network. Our model can capture many important features of use...
John C. S. Lui, Cedric C. F. Fong, H. W. Chan
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
15 years 3 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
EUROCRYPT
2012
Springer
13 years 2 months ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
ETFA
2008
IEEE
15 years 6 months ago
An adaptive network architecture for home- and building environments
Fieldbus networks have significantly improved flexibility and management in classic building automation domains. However, the costs of such installations are still greatly affec...
Rolf Kistler, Stefan Knauth, Alexander Klapproth
ICN
2007
Springer
15 years 6 months ago
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals
—Using Mobile Ad Hoc Networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal...
Bartosz Wietrzyk, Milena Radenkovic