Sciweavers

5752 search results - page 247 / 1151
» Informative Labeling Schemes
Sort
View
VTC
2006
IEEE
110views Communications» more  VTC 2006»
15 years 10 months ago
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
— WLANs will become a major portion of the fourth generation (4G) cellular system. The seamless handoff problem in WLANs is a very important design issue to support the new astou...
Yuh-Shyan Chen, Chung-Kai Chen, Ming-Chin Chuang
SASN
2005
ACM
15 years 9 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
ICPP
1990
IEEE
15 years 8 months ago
Reducing Memory and Traffic Requirements for Scalable Directory-Based Cache Coherence Schemes
As multiprocessors are scaled beyond single bus systems, there is renewed interest in directory-based cache coherence schemes. These schemes rely on a directory to keep track of a...
Anoop Gupta, Wolf-Dietrich Weber, Todd C. Mowry
140
Voted
CRYPTO
2012
Springer
268views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Secret Sharing Schemes for Very Dense Graphs
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any informatio...
Amos Beimel, Oriol Farràs, Yuval Mintz
PST
2004
15 years 5 months ago
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities
This paper presents the first mediated hierarchical identity-based encryption and signature schemes. Both schemes are designed to support information access control in hierarchical...
Deholo Nali, Ali Miri, Carlisle M. Adams