Sciweavers

2601 search results - page 189 / 521
» Secure Rewarding Schemes
Sort
View
ICPR
2004
IEEE
16 years 4 months ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang
132
Voted
PERCOM
2006
ACM
16 years 3 months ago
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks
Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback ...
Tyler Moore
140
Voted
IPCCC
2006
IEEE
15 years 9 months ago
A framework for distributed key management schemes in heterogeneous wireless sensor networks
— Key management is a major challenge in the design and deployment of secure wireless sensor networks. A common assumption in most distributed key management schemes is that all ...
Kejie Lu, Yi Qian, Jiankun Hu
GI
2007
Springer
15 years 7 months ago
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme
: A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for a benefit (some good or service). Recently, Chen et al. [CEL+ 07] prop...
Alberto N. Escalante, Hans Löhr, Ahmad-Reza S...
144
Voted
DCOSS
2006
Springer
15 years 7 months ago
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Yawen Wei, Zhen Yu, Yong Guan