Sciweavers

5948 search results - page 1061 / 1190
» Computing Robust Counter-Strategies
Sort
View
225
Voted
IJACT
2008
136views more  IJACT 2008»
15 years 3 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
CN
2007
154views more  CN 2007»
15 years 3 months ago
Disjoint multipath routing using colored trees
— Multipath routing (MPR) is an effective strategy to achieve robustness, load balancing, congestion reduction, and increased throughput in computer networks. Disjoint multipath ...
Srinivasan Ramasubramanian, Harish Krishnamoorthy,...
127
Voted
ITIIS
2008
128views more  ITIIS 2008»
15 years 3 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
COMSIS
2007
206views more  COMSIS 2007»
15 years 3 months ago
Building an Advanced Invariant Real-Time Human Tracking System
Real-time human tracking is very important in surveillance and robot applications. We note that the performance of any human tracking system depends on its accuracy and its ability...
Fayez Idris, Mazen Abu-Zaher, Rashad J. Rasras, Ib...
IVC
2008
135views more  IVC 2008»
15 years 3 months ago
Multi-modal tracking of people using laser scanners and video camera
Inspite extensive research on visual tracking of multiple people in computer vision area, the robustness and usability of visual trackers are still discouraging. Recently, a few l...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...
« Prev « First page 1061 / 1190 Last » Next »