Sciweavers

674 search results - page 66 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
ICAC
2007
IEEE
13 years 11 months ago
Exploiting Platform Heterogeneity for Power Efficient Data Centers
It has recently become clear that power management is of critical importance in modern enterprise computing environments. The traditional drive for higher performance has influenc...
Ripal Nathuji, Canturk Isci, Eugene Gorbatov
USENIX
2008
13 years 10 months ago
Context-Aware Mechanisms for Reducing Interactive Delays of Energy Management in Disks
Aggressive energy conserving mechanisms can maximize energy efficiency, but often have the negative tradeoff of simultaneously reducing system responsiveness due to the switching ...
Igor Crk, Chris Gniady
CCS
2010
ACM
13 years 8 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
ASIACRYPT
2010
Springer
13 years 5 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
AINA
2005
IEEE
14 years 1 months ago
CAM-Based Huffman Decoding Made Power Efficient
Ternary content addressable (TCAM) is favorable for high-speed search due to its parallel architecture and ability for searching arbitrary-length keys. However, the usage of TCAM ...
Pi-Chung Wang, Chun-Liang Lee, Yuan-Rung Yang, Hun...