Sciweavers

637 search results - page 106 / 128
» The Case for Abstracting Security Policies
Sort
View
136
Voted
INFOCOM
2012
IEEE
13 years 4 months ago
Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones
Abstract—In this paper, we propose to leverage cloud computing to tame resource-poor mobile devices. Specifically, mobile applications can be executed in the mobile device (know...
Yonggang Wen, Weiwen Zhang, Haiyun Luo
PET
2007
Springer
15 years 8 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis
AGENTS
1997
Springer
15 years 6 months ago
High-Level Planning and Low-Level Execution: Towards a Complete Robotic Agent
We have been developing Rogue, an architecture that integrates high-level planning with a low-level executing robotic agent. Rogue is designed as the oce gofer task planner for X...
Karen Zita Haigh, Manuela M. Veloso
JSAC
2011
142views more  JSAC 2011»
14 years 8 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
ACNS
2009
Springer
143views Cryptology» more  ACNS 2009»
15 years 8 months ago
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Abstract. We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, whi...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson