Sciweavers

6861 search results - page 200 / 1373
» Security for Ubiquitous Computing
Sort
View
CRYPTO
2008
Springer
76views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmical...
Ivan Damgård, Yuval Ishai, Mikkel Krø...
EUROPKI
2007
Springer
15 years 10 months ago
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSNâ€...
Rodrigo Roman, Cristina Alcaraz
SAFECOMP
2007
Springer
15 years 10 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...
PERCOM
2004
ACM
16 years 4 months ago
Patch Panel: Enabling Control-Flow Interoperability in Ubicomp Environments
Ubiquitous computing environments accrete slowly over time rather than springing into existence all at once. Mechanisms are needed for incremental integration-the problem of how t...
Rafael Ballagas, Andy Szybalski, Armando Fox
IEEESCC
2008
IEEE
15 years 11 months ago
Towards a SLA-based Approach to Handle Service Disruptions
Service-orientation enables cooperation between multiple organizations and has become a solution of choice to tackle the complexity of ubiquitous computing. The very nature of ubi...
Lionel Touseau, Didier Donsez, Walter Rudametkin