Sciweavers

4612 search results - page 872 / 923
» More Communications
Sort
View
ASIACRYPT
2004
Springer
14 years 2 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
EMSOFT
2004
Springer
14 years 2 months ago
A metrics system for quantifying operational coupling in embedded computer control systems
One central issue in system structuring and quality prediction is the interdependencies of system modules. This paper proposes a novel technique for determining the operational co...
De-Jiu Chen, Martin Törngren
ESAS
2004
Springer
14 years 2 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
ICCS
2004
Springer
14 years 2 months ago
A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering
This paper presents a two-leveled mobile agent system for electronic commerce. It is based on mobile agents as mediators and uses the publish/subscribe paradigm for registration an...
Ozgur Koray Sahingoz, Nadia Erdogan
ICS
2004
Tsinghua U.
14 years 2 months ago
Energy conservation techniques for disk array-based servers
In this paper, we study energy conservation techniques for disk array-based network servers. First, we introduce a new conservation technique, called Popular Data Concentration (P...
Eduardo Pinheiro, Ricardo Bianchini