Sciweavers

27 search results - page 2 / 6
» scn 2010
Sort
View
67
Voted
SCN
2010
Springer
127views Communications» more  SCN 2010»
15 years 7 days ago
Get Shorty via Group Signatures without Encryption
Patrik Bichsel, Jan Camenisch, Gregory Neven, Nige...
SCN
2010
Springer
109views Communications» more  SCN 2010»
15 years 7 days ago
malnets: large-scale malicious networks via compromised wireless access points
Patrick Traynor, Kevin R. B. Butler, William Enck,...
137
Voted
SCN
2010
Springer
145views Communications» more  SCN 2010»
14 years 8 months ago
A guide to trust in mobile ad hoc networks
In this paper we examine issues of trust and reputation in Mobile Ad hoc Networks. We look at a number of the trust and reputation models that have been proposed and we highlight o...
Shane Balfe, Po-Wah Yau, Kenneth G. Paterson
TCOM
2010
108views more  TCOM 2010»
15 years 6 days ago
On the condition number distribution of complex wishart matrices
Abstract—This paper investigates the distribution of the condition number of complex Wishart matrices. Two closely related measures are considered: the standard condition number ...
Michail Matthaiou, Matthew R. McKay, Peter J. Smit...
127
Voted
SCN
2010
Springer
132views Communications» more  SCN 2010»
14 years 11 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente