Sciweavers

674 search results - page 79 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
GIS
2009
ACM
14 years 8 months ago
Efficient and Secure Distribution of Massive Geo-Spatial Data
Modern geographic databases can contain a large volume of data that need to be distributed to subscribed customers. The data can be modeled as a cube, where typical dimensions inc...
Hao Yuan, Mikhail J. Atallah
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
GRAPHICSINTERFACE
2000
13 years 9 months ago
Triangle Strip Compression
In this paper we introduce a simple and efficient scheme for encodingthe connectivityand the stripification of a triangle mesh. Since generating a good set of triangle strips is a...
Martin Isenburg
EUROCRYPT
2000
Springer
13 years 11 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
SPE
2010
114views more  SPE 2010»
13 years 6 months ago
A survey of the research on power management techniques for high-performance systems
This paper surveys the research on power management techniques for high performance systems. These include both commercial high performance clusters and scientific high performanc...
Yongpeng Liu, Hong Zhu