Sciweavers

7134 search results - page 1303 / 1427
» A comparative study of map use
Sort
View
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
SIGMETRICS
2004
ACM
145views Hardware» more  SIGMETRICS 2004»
14 years 3 months ago
A resource-allocation queueing fairness measure
Fairness is a major issue in the operation of queues, perhaps it is the reason why queues were formed in the first place. Recent studies show that the fairness of a queueing syst...
David Raz, Hanoch Levy, Benjamin Avi-Itzhak
MDM
2004
Springer
14 years 3 months ago
Processing Range-Monitoring Queries on Heterogeneous Mobile Objects
We consider in this paper how to leverage heterogeneous mobile computing capability for efficient processing of real-time range-monitoring queries. In our environment, each mobil...
Ying Cai, Kien A. Hua, Guohong Cao
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
14 years 3 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
« Prev « First page 1303 / 1427 Last » Next »