Sciweavers

1748 search results - page 196 / 350
» Security Models for Heterogeneous Networking
Sort
View
142
Voted
EUROCRYPT
2007
Springer
15 years 10 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
144
Voted
SIGCOMM
1998
ACM
15 years 8 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
156
Voted
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 9 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
ICCCN
2007
IEEE
15 years 10 months ago
A Framework for Querying Sensor Networks Using Mobile Devices
—an interplay between mobile devices and static sensor nodes is envisioned in the near future. This will enable a heterogeneous design space that can offset the stringent resourc...
Shourui Tian, Sol M. Shatz, Yang Yu
ISCAS
2006
IEEE
160views Hardware» more  ISCAS 2006»
15 years 10 months ago
Address-event image sensor network
We describe a sensor network based on smart requirements of the network. This will provide a new approach imager sensors able to extract events of interest from a scene. for compos...
Eugenio Culurciello, Andreas Savvides