Sciweavers

674 search results - page 32 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
15 years 1 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
PERCOM
2008
ACM
14 years 9 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
TCS
2010
14 years 4 months ago
Bounds on the efficiency of black-box commitment schemes
Constructions of cryptographic primitives based on general assumptions (e.g., one-way functions) tend to be less efficient than constructions based on specific (e.g., number-theor...
Omer Horvitz, Jonathan Katz
CSREAPSC
2006
14 years 11 months ago
A Context-aware Handoff Management for Seamless Connectivity in Ubiquitous Computing Environment
- Despite the importance of seamless connectivity in ubiquitous computing, research for seamless connectivity is not considered properly. To provide seamless connectivity, this pap...
Tae-Hoon Kang, Chung-Pyo Hong, Yong-Seok Kim, Shin...
EGC
2005
Springer
15 years 3 months ago
A Task Replication and Fair Resource Management Scheme for Fault Tolerant Grids
In this paper we study a fault tolerant model for Grid environments based on the task replication concept. The basic idea is to produce and submit to the Grid multiple replicas of ...
Antonios Litke, Konstantinos Tserpes, Konstantinos...