Sciweavers

1058 search results - page 117 / 212
» Secure Group Communications Using Key Graphs
Sort
View
91
Voted
ECAI
2004
Springer
15 years 8 months ago
Adaptive Robot Coordination Using Interference Metrics
Abstract. One key issue facing robotic teams is effective coordination mechanisms. Many robotic groups operate within domains where restrictions such as limiting areas of operation...
Avi Rosenfeld, Gal A. Kaminka, Sarit Kraus
122
Voted
SAC
2006
ACM
15 years 8 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
124
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
150
Voted
MOBIHOC
2005
ACM
16 years 2 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
GRID
2008
Springer
15 years 2 months ago
ADL: An Algorithm Definition Language for SmartGridSolve
SmartGridSolve is an extension of GridSolve that expands the single task map and client-server model of GridRPC by implementing server to server communication and the mapping of a...
Michele Guidolin, Alexey L. Lastovetsky