Sciweavers

2575 search results - page 490 / 515
» Car-Park Management using Wireless Sensor Networks
Sort
View
ADHOCNOW
2006
Springer
14 years 1 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
MSWIM
2005
ACM
14 years 27 days ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
PERCOM
2006
ACM
14 years 7 months ago
An E-Learning Platform for Academy and Industry Networks
The European project COMSON (Coupled Multiscale Simulation and Optimization in Nanoelectronics) is a Marie Curie RTN project that involves five partners from academia and three fr...
Giuseppe Ali, Eleonora Bilotta, Lorella Gabriele, ...
MOBISYS
2010
ACM
13 years 9 months ago
CrowdSearch: exploiting crowds for accurate real-time image search on mobile phones
Mobile phones are becoming increasingly sophisticated with a rich set of on-board sensors and ubiquitous wireless connectivity. However, the ability to fully exploit the sensing c...
Tingxin Yan, Vikas Kumar, Deepak Ganesan
CCS
2006
ACM
13 years 11 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh