Sciweavers

400 search results - page 66 / 80
» RFID Security: Tradeoffs between Security and Efficiency
Sort
View
CLADE
2008
IEEE
14 years 11 months ago
A grid-enabled workflow system for reservoir uncertainty analysis
Reservoir uncertainty analysis is significant for petroleum engineers for predictions of reservoir performance. However, analysis of reservoir performance uncertainty is challengi...
Emrah Ceyhan, Gabrielle Allen, Christopher D. Whit...
CSREASAM
2004
14 years 11 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
IJSN
2006
96views more  IJSN 2006»
14 years 9 months ago
A new signature scheme without random oracles
In this paper, we propose a new signature scheme that is existentially unforgeable under a chosen message attack without random oracle. The security of our scheme depends on a new ...
Chik How Tan
BTW
2005
Springer
80views Database» more  BTW 2005»
15 years 3 months ago
Measuring the Quality of Approximated Clusterings
Abstract. Clustering has become an increasingly important task in modern application domains. In many areas, e.g. when clustering complex objects, in distributed clustering, or whe...
Hans-Peter Kriegel, Martin Pfeifle
MOBIHOC
2007
ACM
15 years 9 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao