Sciweavers

1116 search results - page 174 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
167
Voted
SCN
2008
Springer
147views Communications» more  SCN 2008»
15 years 14 days ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
VLSID
2006
IEEE
183views VLSI» more  VLSID 2006»
15 years 6 months ago
Design Challenges for High Performance Nano-Technology
This tutorial present the key aspects of design challenges and its solutions that are being experienced in VLSI design in the era of nano technology. The focus will be on design c...
Goutam Debnath, Paul J. Thadikaran
CVIU
2006
162views more  CVIU 2006»
15 years 17 days ago
Unsupervised scene analysis: A hidden Markov model approach
This paper presents a new approach to scene analysis, which aims at extracting structured information from a video sequence using directly low-level data. The method models the se...
Manuele Bicego, Marco Cristani, Vittorio Murino
123
Voted
MASS
2010
156views Communications» more  MASS 2010»
14 years 10 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
115
Voted
CCS
2011
ACM
14 years 15 days ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King