Sciweavers

674 search results - page 63 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 2 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
IJMSO
2007
201views more  IJMSO 2007»
13 years 7 months ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
ICEIS
2000
IEEE
14 years 2 days ago
Syntax-Directed Translation Schemes for Multi-Agent Systems Conversation Modelling
: In modern organisations the monolithic information systems of the past are being gradually replaced by networked systems, enabling distributed computing often based on multi-agen...
Ana L. N. Fred, Joaquim Filipe
ICUIMC
2009
ACM
14 years 2 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
P2P
2007
IEEE
14 years 1 months ago
A Data Placement Scheme with Time-Related Model for P2P Storages
Maintaining desired data availability while minimizing costs is the primary challenge in designing P2P storages. Data placement schemes and data availability calculation methods a...
Jing Tian, Zhi Yang, Yafei Dai