Sciweavers

403 search results - page 67 / 81
» Efficient Algorithms for Secure Multicast key Management
Sort
View
IJNSEC
2008
135views more  IJNSEC 2008»
13 years 7 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
COMPUTER
2007
123views more  COMPUTER 2007»
13 years 7 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
SIGMOD
2008
ACM
103views Database» more  SIGMOD 2008»
14 years 7 months ago
XArch: archiving scientific and reference data
Database archiving is important for the retrieval of old versions of a database and for temporal queries over the history of data. We demonstrate XArch, a management system for ma...
Heiko Müller, Ioannis Koltsidas, Peter Bunema...
PERCOM
2008
ACM
14 years 7 months ago
Budget-Based Clustering with Context-awareness for Sensor Networks
As the scale of modern sensor networks continues to grow, energy consumption, scalability and routing efficiency are becoming key design challenges. Network management plays an im...
Jiaxi You, Dominik Lieckfeldt, Matthias Handy, Dir...
ISI
2005
Springer
14 years 1 months ago
Information Supply Chain: A Unified Framework for Information-Sharing
To balance demand and supply of information, we propose a framework called “information supply chain” (ISC). This framework is based on supply chain management (SCM), which has...
Shuang Sun, John Yen