Sciweavers

330 search results - page 23 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
IPSN
2007
Springer
14 years 2 months ago
Dozer: ultra-low power data gathering in sensor networks
Environmental monitoring is one of the driving applications in the domain of sensor networks. The lifetime of such systems is envisioned to exceed several years. To achieve this l...
Nicolas Burri, Pascal von Rickenbach, Roger Watten...
CNSR
2006
IEEE
14 years 2 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
CLUSTER
2001
IEEE
14 years 13 days ago
Cluster-Based Computing with Active, Persistent Objects on the Web
This paper describes a middleware that enables its target application to dynamically incorporate heterogeneous nodes of a cluster. It distributes the objects of the application ac...
Frank Sommers, Shahram Ghandeharizadeh, Shan Gao
CCS
2008
ACM
13 years 10 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
IWCMC
2010
ACM
13 years 10 months ago
Using connection expansion to reduce control traffic in MANETs
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Zeki Bilgin, Bilal Khan, Ala I. Al-Fuqaha