Sciweavers

5752 search results - page 168 / 1151
» Informative Labeling Schemes
Sort
View
133
Voted
APNOMS
2006
Springer
15 years 7 months ago
A Seamless Service Management with Context-Aware Handoff Scheme in Ubiquitous Computing Environment
Abstract. Despite the importance of seamless connectivity in ubiquitous computing, research for seamless connectivity has not been considered properly. To provide seamless connecti...
Tae-Hoon Kang, Chung-Pyo Hong, Won-Joo Jang, Shin-...
147
Voted
IEEEIAS
2009
IEEE
15 years 1 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
15 years 10 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
PERCOM
2005
ACM
16 years 3 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
144
Voted
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
15 years 9 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai