Sciweavers

546 search results - page 86 / 110
» An Implementation Scheme of Relational Tables
Sort
View
JSAC
2011
115views more  JSAC 2011»
13 years 2 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
CODASPY
2012
12 years 3 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
PET
2012
Springer
11 years 10 months ago
PRISM - Privacy-Preserving Search in MapReduce
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva,...
ISW
2004
Springer
14 years 27 days ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...
CDC
2009
IEEE
106views Control Systems» more  CDC 2009»
14 years 7 days ago
Visual motion observer-based pose synchronization: A passivity approach
— In this paper, we address a motion synchronization problem in SE(3) and present a novel passivity based visual feedback system. Though a passivity based control law to achieve ...
Masayuki Fujita, Takeshi Hatanaka, Naoto Kobayashi...