Sciweavers

1058 search results - page 100 / 212
» Secure Group Communications Using Key Graphs
Sort
View
141
Voted
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 28 days ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
144
Voted
MWCN
2004
Springer
15 years 8 months ago
Energy-Efficient Multimedia Communications in Lossy Multi-Hop Wireless Networks
Abstract A key concern in multi-hop wireless networks is energy-efficiency due to batterypower constrained mobile nodes. The network interface is a significant consumer of energy...
Albert F. Harris III, Cigdem Sengul, Robin Kravets...
CORR
2011
Springer
149views Education» more  CORR 2011»
14 years 9 months ago
Solving k-Set Agreement with Stable Skeleton Graphs
In this paper we consider the k-set agreement problem in distributed round-based systems where processes communicate by message passing. We capture the synchrony and reliability o...
Martin Biely, Peter Robinson, Ulrich Schmid
SAFECOMP
2009
Springer
15 years 9 months ago
Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Fa
The advanced electric power grid is a cyber-physical system comprised of physical components such as transmission lines and generators and a network of embedded systems deployed fo...
Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin
CSREASAM
2006
15 years 3 months ago
Trusted Storage: Focus on Use Cases
This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
Robert Thibadeau, Michael Willett