Sciweavers

247 search results - page 7 / 50
» A Self-healing Key Distribution Scheme with Novel Properties
Sort
View
ESORICS
2004
Springer
14 years 2 months ago
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
Seyit Ahmet Çamtepe, Bülent Yener
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 8 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
ICRA
2010
IEEE
96views Robotics» more  ICRA 2010»
13 years 7 months ago
Port-Hamiltonian analysis of a novel robotic finger concept for minimal actuation variable impedance grasping
Abstract— This paper introduces a novel robotic finger concept for variable impedance grasping in unstructured tasks. A brief literature survey reveals the need for minimal comp...
Martin Wassink, Raffaella Carloni, Stefano Stramig...
ICPR
2006
IEEE
14 years 10 months ago
Contour Encoding Based on Extraction of Key Points Using Wavelet Transform
In many situations it is convenient to represent pictorial data in the form of contours. It may become necessary to compress such contour data for efficient storage and transmissi...
Pravas Mahapatra, Vishnu Makkapati
SCN
2004
Springer
123views Communications» more  SCN 2004»
14 years 2 months ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros