Sciweavers

620 search results - page 113 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
TPDS
2008
91views more  TPDS 2008»
14 years 9 months ago
SSW: A Small-World-Based Overlay for Peer-to-Peer Search
Peer-to-peer (P2P) systems have become a popular platform for sharing and exchanging voluminous information among thousands or even millions of users. The massive amount of inform...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam, Jin...
JUCS
2010
167views more  JUCS 2010»
14 years 8 months ago
Ontology based Approach in Knowledge Sharing Measurement
: For many years, physical asset indicators were the main evidence of an organization’s successful performance. However, the situation has changed following the revolution of inf...
Behrang Zadjabbari, Pornpit Wongthongtham, Farookh...
MASS
2010
156views Communications» more  MASS 2010»
14 years 7 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
IACR
2011
221views more  IACR 2011»
13 years 9 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
SIGMOD
2009
ACM
192views Database» more  SIGMOD 2009»
15 years 9 months ago
A gauss function based approach for unbalanced ontology matching
Ontology matching, aiming to obtain semantic correspondences between two ontologies, has played a key role in data exchange, data integration and metadata management. Among numero...
Qian Zhong, Hanyu Li, Juanzi Li, Guo Tong Xie, Jie...