Sciweavers

2081 search results - page 133 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
AGENTS
1997
Springer
14 years 18 days ago
Yenta: A Multi-Agent, Referral-Based Matchmaking System
Many important and useful applications for software agents require multiple agents on a network that communicate with each other. Such agents must find each other and perform a u...
Leonard N. Foner
JIPS
2007
131views more  JIPS 2007»
13 years 8 months ago
A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations
: We propose several practical SMC protocols for privacy-preserving cooperative scientific computations. We consider two important scientific computations which involve linear equa...
Ju-Sung Kang, Dowon Hong
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
13 years 6 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
INFOCOM
2006
IEEE
14 years 2 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
ISSS
1997
IEEE
105views Hardware» more  ISSS 1997»
14 years 19 days ago
Co-Emulation and Debugging of HW/SW-Systems
In this paper we present a method that allows to observe and control the emulation of communicating systems consisting of hardware and software parts. The approach provides the ab...
Gernot Koch, Udo Kebschull, Wolfgang Rosenstiel