Sciweavers

5752 search results - page 144 / 1151
» Informative Labeling Schemes
Sort
View
138
Voted
SASN
2004
ACM
15 years 7 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 8 months ago
Transmit Antenna Subset Selection for Downlink MIMO Systems
—This paper discusses transmit antenna subset selection schemes for downlink closed-loop multiple-input multiple-output (MIMO) systems in multicell environments. A simplified coo...
Jee Woong Kang, Hui Won Je, Kwang Bok Lee
150
Voted
CHI
2011
ACM
14 years 6 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
ISN
1998
Springer
15 years 6 months ago
Secure Billing for Mobile Information Services in UMTS
This paper presents solutions developed in the ACTS ASPeCT project for advanced security features in UMTS. In particular, a secure billing scheme for value-added information servic...
Keith M. Martin, Bart Preneel, Chris J. Mitchell, ...
INFOCOM
2005
IEEE
15 years 8 months ago
Hybrid search schemes for unstructured peer-to-peer networks
— We study hybrid search schemes for unstructured peer-to-peer networks. We quantify performance in terms of number of hits, network overhead, and response time. Our schemes comb...
Christos Gkantsidis, Milena Mihail, Amin Saberi