Sciweavers

436 search results - page 83 / 88
» Using trust assumptions with security requirements
Sort
View
110
Voted
AGENTS
1998
Springer
15 years 1 months ago
Cognition and Affect: Architectures and Tools
Which agent architectures are capable of justifying descriptions in terms of the `higher level' mental concepts applicable to human beings? We propose a new kind of architect...
Aaron Sloman, Brian Logan
STACS
2010
Springer
15 years 4 months ago
Collapsing and Separating Completeness Notions under Average-Case and Worst-Case Hypotheses
This paper presents the following results on sets that are complete for NP. (i) If there is a problem in NP that requires 2nΩ(1) time at almost all lengths, then every many-one N...
Xiaoyang Gu, John M. Hitchcock, Aduri Pavan
74
Voted
ICDCSW
2005
IEEE
15 years 3 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
CISS
2010
IEEE
14 years 1 months ago
Retrodirective distributed transmit beamforming with two-way source synchronization
—Distributed transmit beamforming has recently been proposed as a technique in which several single-antenna sources cooperate to form a virtual antenna array and simultaneously t...
Robert D. Preuss, D. Richard Brown
94
Voted
SASN
2004
ACM
15 years 2 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...