Sciweavers

1720 search results - page 230 / 344
» eg 2008
Sort
View
WECWIS
2008
IEEE
104views ECommerce» more  WECWIS 2008»
15 years 4 months ago
WSDL-D: A Flexible Web Service Invocation Mechanism for Large Datasets
WSDL web services are built around the request-reply framework, requiring service invocation to be bundled together with all relevant data in a single message. Inefficiency become...
Mark Wiley, Aihua Wu 0002, Jianwen Su
WIMOB
2008
IEEE
15 years 4 months ago
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and ...
Giacomo de Meulenaer, François Gosset, Fran...
ACIVS
2008
Springer
15 years 4 months ago
Adaptive Metadata Management System for Distributed Video Content Analysis
Scientific advances in the development of video processing algorithms now allow various distributed and collaborative vision-based applications. However, the lack of recognised st...
C. Carincotte, Xavier Desurmont, A. Bastide
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 4 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to “side-channel attacks...
D. Canright, Lejla Batina
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 4 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith