Sciweavers

4529 search results - page 51 / 906
» Position Based Cryptography
Sort
View
ADT
2010
14 years 10 months ago
Survey of NLOS identification and error mitigation problems in UWB-based positioning algorithms for dense environments
Abstract In this survey, the currently available ultrawideband-based non-line-of-sight (NLOS) identification and error mitigation methods are presented. They are classified into se...
Jasurbek Khodjaev, Yongwan Park, Aamir Saeed Malik
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 11 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
ICRA
1999
IEEE
145views Robotics» more  ICRA 1999»
15 years 4 months ago
Real Time Position Estimation for Mobile Robots by Means of Sonar Sensors
This paper presents a fast localisation algorithm for autonomous mobile agents in dynamic environments based on the definition of a new very small sized landmark type. These landm...
Cristina Urdiales, Antonio Bandera, R. Ron, Franci...
EUROPKI
2007
Springer
15 years 6 months ago
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSNâ€...
Rodrigo Roman, Cristina Alcaraz
ESORICS
2004
Springer
15 years 5 months ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller