Sciweavers

1709 search results - page 35 / 342
» An active network approach to virtual private networks
Sort
View
101
Voted
INFOCOM
2005
IEEE
15 years 7 months ago
GPS free coordinate assignment and routing in wireless sensor networks
— In this paper we consider the problem of constructing a coordinate system in a sensor network where location information is not available. To this purpose we introduce the Virt...
Antonio Caruso, Stefano Chessa, Swades De, A. Urpi
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
92
Voted
OZCHI
2005
ACM
15 years 7 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
102
Voted
CONEXT
2006
ACM
15 years 7 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
135
Voted
CSE
2009
IEEE
15 years 5 months ago
Churn Prediction in MMORPGs: A Social Influence Based Approach
Massively Multiplayer Online Role Playing Games (MMORPGs) are computer based games in which players interact with one another in the virtual world. Worldwide revenues for MMORPGs h...
Jaya Kawale, Aditya Pal, Jaideep Srivastava