Sciweavers

1251 search results - page 219 / 251
» On the security of group communication schemes
Sort
View
MOBIHOC
2008
ACM
16 years 1 months ago
Bubble rap: social-based forwarding in delay tolerant networks
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket S...
Pan Hui, Jon Crowcroft, Eiko Yoneki
CRYPTO
1994
Springer
98views Cryptology» more  CRYPTO 1994»
15 years 6 months ago
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
Ronald Cramer, Ivan Damgård, Berry Schoenmak...
129
Voted
TWC
2010
14 years 8 months ago
Clustering and cluster-based routing protocol for delay-tolerant mobile networks
This research investigates distributed clustering scheme and proposes a cluster-based routing protocol for DelayTolerant Mobile Networks (DTMNs). The basic idea is to distributivel...
Ha Dang, Hongyi Wu
143
Voted
ICPP
1998
IEEE
15 years 6 months ago
MPEG-4 Based Interactive Video using Parallel Processing
MPEG-4 which is currently being developed by MPEG (Moving Pictures Experts Group), is poised to become a standard for supporting current and emerging interactive multimedia applic...
Yong He, Ishfaq Ahmad, Ming L. Liou
IPSN
2005
Springer
15 years 7 months ago
Geographic routing with limited information in sensor networks
Geographic routing with greedy relaying strategies have been widely studied as a routing scheme in sensor networks. These schemes assume that the nodes have perfect information ab...
Sundar Subramanian, Sanjay Shakkottai