Sciweavers

404 search results - page 29 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
119
Voted
SECON
2008
IEEE
15 years 10 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
129
Voted
ICNS
2007
IEEE
15 years 10 months ago
Performance Evaluation of Real-Time Message Delivery in RDM Algorithm
Complexity of distributed real-time applications such as automotive electronics has increased dramatically over the last couple of years. As a result, developing communication pro...
Shabnam Mirshokraie, Mojtaba Sabeghi, Mahmoud Nagh...
INFOCOM
2012
IEEE
13 years 6 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
184
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 10 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
106
Voted
CORR
2007
Springer
88views Education» more  CORR 2007»
15 years 3 months ago
Augmented Tree-based Routing Protocol for Scalable Ad Hoc Networks
—In ad hoc networks scalability is a critical requirement if these technologies have to reach their full potential. Most of the proposed routing protocols do not operate efficien...
Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paur...