Sciweavers

14824 search results - page 2775 / 2965
» Security - Introduction
Sort
View
CORR
2011
Springer
221views Education» more  CORR 2011»
14 years 6 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
DCC
2011
IEEE
14 years 6 months ago
Computing bilinear pairings on elliptic curves with automorphisms
In this paper, we present a novel method for constructing a super-optimal pairing with great efficiency, which we call the omega pairing. The computation of the omega pairing requi...
Changan Zhao, Dongqing Xie, Fangguo Zhang, Jingwei...
CORR
2010
Springer
186views Education» more  CORR 2010»
14 years 6 months ago
QoS Routing in Smart Grid
Smart grid is an emerging technology which is able to control the power load via price signaling. The communication between the power supplier and power customers is a key issue in...
Husheng Li, Weiyi Zhang
IAJIT
2011
14 years 6 months ago
Social Issues in wireless sensor networks with healthcare perspective
: The recent advances in Wireless Sensor Networks have given rise to many application areas in healthcare. It has produced new field of Wireless Body Area Networks. Using wearable ...
Moshaddique Al Ameen, Kyung Sup Kwak
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 6 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
« Prev « First page 2775 / 2965 Last » Next »