Sciweavers

2394 search results - page 297 / 479
» Implementing Mobile Haskell
Sort
View
WD
2010
13 years 8 months ago
Vicinity resource cartography for delay-tolerant networks: A holistic perspective
In this paper we propose a distributed approach to construct vicinity resource maps at each node in a delaytolerant network. The scheme uses recent encounters to estimate the avail...
Gabriel Sandulescu, Péter Schaffer, Simin N...
CORR
2011
Springer
183views Education» more  CORR 2011»
13 years 5 months ago
Detecting Separation in Robotic and Sensor Networks
In this paper we consider the problem of monitoring detecting separation of agents from a base station in robotic and sensor networks. Such separation can be caused by mobility an...
Chenda Liao, Harshavardhan Chenji, Prabir Barooah,...
IACR
2011
252views more  IACR 2011»
12 years 10 months ago
A Meet-in-the-Middle Attack on the Full KASUMI
KASUMI is a block cipher which consists eight Feistel rounds with a 128-bit key. The confidentiality and integrity of UMTS, GSM and GPRS mobile communications systems depend heavi...
Keting Jia, Hongbo Yu, Xiaoyun Wang
INFOCOM
2012
IEEE
12 years 26 days ago
Phantom: Physical layer cooperation for location privacy protection
—Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily col...
Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
14 years 12 days ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...