Sciweavers

322 search results - page 33 / 65
» Entity Authentication and Key Distribution
Sort
View
ACSD
2005
IEEE
114views Hardware» more  ACSD 2005»
14 years 2 months ago
Controlling Speculative Design Processes Using Rich Component Models
This paper elaborates on the application of some aspects of robust systems control theory to the management of uncertainty and risk in distributed and complex design processes, ha...
Werner Damm
HCW
1998
IEEE
14 years 24 days ago
Implementing Distributed Synthetic Forces Simulations in Metacomputing Environments
A distributed, parallel implementation of the widely used Modular Semi-Automated Forces ModSAF Distributed Interactive Simulation DIS is presented, with Scalable Parallel Processo...
Sharon Brunett, Dan Davis, Thomas Gottschalk, Paul...
ATAL
2003
Springer
14 years 1 months ago
A prototype infrastructure for distributed robot-agent-person teams
Effective coordination of robots, agents and people promises to improve the safety, robustness and quality with which shared goals are achieved by harnessing the highly heterogene...
Paul Scerri, David V. Pynadath, W. Lewis Johnson, ...
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
14 years 2 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
14 years 13 days ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...