Sciweavers

1395 search results - page 263 / 279
» Communication Security in Multi-agent Systems
Sort
View
SBRN
2000
IEEE
14 years 1 months ago
Non-Linear Modelling and Chaotic Neural Networks
This paper proposes a simple methodology to construct an iterative neural network which mimics a given chaotic time series. The methodology uses the Gamma test to identify a suita...
Antonia J. Jones, Steve Margetts, Peter Durrant, A...
EUROCRYPT
1999
Springer
14 years 29 days ago
Conditional Oblivious Transfer and Timed-Release Encryption
Abstract. We consider the problem of sending messages into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anon...
Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramak...
PODC
2010
ACM
14 years 18 days ago
Brief announcement: improving social-network-based sybil-resilient node admission control
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiti...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...
ESAS
2006
Springer
14 years 11 days ago
Impact of Pseudonym Changes on Geographic Routing in VANETs
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and priv...
Elmar Schoch, Frank Kargl, Tim Leinmüller, St...
ISTAR
2008
13 years 10 months ago
Improving the Syntax and Semantics of Goal Modelling Languages
One major obstacle to requirements engineering (RE) is the growing complexity of today's systems. Such a complexity can only be fficiently by powerful abstraction mechanisms a...
Raimundas Matulevicius