Sciweavers

24421 search results - page 425 / 4885
» Communicating Complex Systems
Sort
View
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
GPC
2008
Springer
15 years 5 months ago
Write Once, Run Anywhere - A Survey of Mobile Runtime Environments
The hype surrounding Web 2.0 and technologies such as AJAX shows: The future of distributed application development lies in Rich Internet Applications (RIAs), which are based on h...
Sören Blom, Matthias Book, Volker Gruhn, Rusl...
CN
2006
62views more  CN 2006»
15 years 4 months ago
Key bundles and parcels: Secure communication in many groups
We consider a system where each user is in one or more elementary groups. In this system, arbitrary groups of users can be specified using the operations of union, intersection, a...
Eunjin Jung, Alex X. Liu, Mohamed G. Gouda
SOQUA
2007
15 years 5 months ago
Designing multi-layers self-adaptive complex applications
The impossibility of statically determining the behavior of complex systems that interact at runtime with heterogeneous devices and remote entities, may lead to unexpected system ...
Davide Lorenzoli, Davide Tosi, Salvatore Venticinq...
VTC
2008
IEEE
15 years 10 months ago
Optimizing Adaptive Transmission Policies for Wireless Vehicular Communications
—The adoption of wireless vehicular communication technologies would strongly depend on the technologies transmission reliability, required by QoS demanding traffic safety applic...
Miguel Sepulcre, Javier Gozálvez