Sciweavers

21520 search results - page 87 / 4304
» Symmetric network computation
Sort
View
JMIV
2000
143views more  JMIV 2000»
15 years 5 months ago
A Linear Algorithm for Computing the Homography from Conics in Correspondence
Abstract. This paper presents a study, based on conic correspondences, on the relationship between two perspective images acquired by an uncalibrated camera. We show that for a pai...
Akihiro Sugimoto
SENSYS
2005
ACM
15 years 11 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
SPW
2000
Springer
15 years 9 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
SENSYS
2010
ACM
15 years 3 months ago
Surviving wi-fi interference in low power ZigBee networks
Frequency overlap across wireless networks with different radio technologies can cause severe interference and reduce communication reliability. The circumstances are particularly...
Chieh-Jan Mike Liang, Bodhi Priyantha, Jie Liu, An...
ACSAC
2009
IEEE
16 years 6 days ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans