Sciweavers

674 search results - page 53 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
SPIESR
2001
113views Database» more  SPIESR 2001»
13 years 9 months ago
Scalable hierarchical video summary and search
Recently, a huge amount of the video data available in the digital form has given users to allow more ubiquitous access to visual information than ever. To efficiently manage such...
Sanghoon Sull, Jung-Rim Kim, Yunam Kim, Hyun S. Ch...
EUROCRYPT
2009
Springer
14 years 8 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
13 years 11 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
PERVASIVE
2009
Springer
14 years 2 months ago
Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker
Research has demonstrated that information workers often manage several different computing devices in an effort to balance convenience, mobility, input efficiency, and content rea...
Amy K. Karlson, Brian Meyers, Andy Jacobs, Paul Jo...
CNSR
2009
IEEE
164views Communications» more  CNSR 2009»
13 years 11 months ago
DibA: An Adaptive Broadcasting Scheme in Mobile Ad Hoc Networks
Broadcasting is a vital communication mechanism in Mobile Ad Hoc Networks, as it is the key element for exchanging control packets to support some services such as management and ...
Dimitrios Liarokapis, Alireza Shahrabi, Andreas Ko...