Sciweavers

1610 search results - page 114 / 322
» Identity Based Multisignatures
Sort
View
IJNSEC
2010
152views more  IJNSEC 2010»
14 years 10 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
JDCTA
2010
150views more  JDCTA 2010»
14 years 10 months ago
A Knowledge Recommend System Based on User Model
The content and searching method of knowledge base are lack of the consideration of user requirements, it is difficult for the user to select the knowledge satisfy with the user r...
Jiagen Sheng, Sifeng Liu
ICASSP
2011
IEEE
14 years 6 months ago
Two effective and computationally efficient pure-pixel based algorithms for hyperspectral endmember extraction
Endmember extraction is of prime importance in the process of hyperspectral unmixing so as to study the mineral composition of a landscape from its hyperspectral observations. Tho...
Arul-Murugan Ambikapathi, Tsung-Han Chan, Chong-Yu...
ISPEC
2011
Springer
14 years 6 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
IAT
2007
IEEE
15 years 9 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...