Sciweavers

674 search results - page 29 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
SASO
2008
IEEE
15 years 4 months ago
Pervasive Self-Learning with Multi-modal Distributed Sensors
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 9 months ago
A Simple User Authentication Scheme for Grid Computing
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for us...
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui L...
ICPR
2006
IEEE
15 years 10 months ago
Contour Encoding Based on Extraction of Key Points Using Wavelet Transform
In many situations it is convenient to represent pictorial data in the form of contours. It may become necessary to compress such contour data for efficient storage and transmissi...
Pravas Mahapatra, Vishnu Makkapati
ISCAPDCS
2007
14 years 11 months ago
Efficient soft QoS guarantee in mobile ad hoc networks
More and more Quality of Service (QoS) sensitive applications, such as streaming media, high bandwidth content distribution and VoIP, will be deployed in Mobile Ad hoc Networks (M...
Gaogang Xie, Zhenyu Li, Valérie Issarny, Al...
AFRICACRYPT
2010
Springer
15 years 1 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...