Sciweavers

31 search results - page 2 / 7
» euc 2008
Sort
View
EUC
2008
Springer
14 years 11 months ago
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks
The broadcast operation is a fundamental service in wireless ad hoc networks. The na
Yu Huang 0002, Bo Liu, XianPing Tao, Jiannong Cao,...
EUC
2008
Springer
14 years 11 months ago
Efficient Client-to-Client Password Authenticated Key Exchange
With the rapid proliferation of client-to-client applications, PAKE (password authenticated key exchange) protocols in the client-to-client setting become increasingly important. ...
Yanjiang Yang, Feng Bao, Robert H. Deng
EUC
2008
Springer
14 years 11 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
EUC
2008
Springer
14 years 11 months ago
UMDD: User Model Driven Software Development
The existing software engineering seldom considers software usability, and Human-Computer Interaction (HCI) techniques which can improve the software usability cannot guarantee de...
Xiaochun Wang, Yuanchun Shi
EUC
2008
Springer
14 years 11 months ago
Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors
This paper presents real-time scheduling techniques for reducing the response time of aperiodic tasks scheduled with real-time periodic tasks on multiprocessor systems. Two proble...
Shinpei Kato, Nobuyuki Yamasaki