Sciweavers

4190 search results - page 715 / 838
» Implementing commitment-based interactions
Sort
View
COMCOM
2011
14 years 9 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 9 months ago
Fully Simulatable Quantum-Secure Coin-Flipping and Applications
We propose a coin-flip protocol which yields a string of strong, random coins and is fully simulatable against poly-sized quantum adversaries on both sides. It can be implemented ...
Carolin Lunemann, Jesper Buus Nielsen
118
Voted
EWC
2011
98views more  EWC 2011»
14 years 9 months ago
Real-time triangulation of point streams
Hand-held laser scanners are commonly used in industry for reverse engineering and quality measurements. In this process, it is difficult for the human operator to scan the target...
Klaus Denker, Burkhard Lehner, Georg Umlauf
CSCL
2010
14 years 9 months ago
Using activity theory to understand intergenerational play: The case of Family Quest
We implemented a five-week family program called Family Quest where parents and children ages 9 to 13 played Quest Atlantis, a multiuser 3D educational computer game, at a local af...
Sinem Siyahhan, Sasha A. Barab, Michael P. Downton
JSAC
2011
167views more  JSAC 2011»
14 years 9 months ago
Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Senhua Huang, Xin Liu, Zhi Ding