Sciweavers

55 search results - page 7 / 11
» On Key Assignment for Hierarchical Access Control
Sort
View
MATA
2005
Springer
146views Communications» more  MATA 2005»
14 years 1 months ago
Distributed Authorization Framework for Mobile Agents
Abstract. Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems ...
Guillermo Navarro, Jose A. Ortega-Ruiz, Joan Ametl...
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
14 years 1 months ago
Characterizing Ideal Weighted Threshold Secret Sharing
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user is assigned a positive w...
Amos Beimel, Tamir Tassa, Enav Weinreb
WS
2003
ACM
14 years 1 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
NETCOOP
2009
Springer
14 years 2 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
MWCN
2004
Springer
14 years 1 months ago
Cluster-Based Location-Services for Scalable Ad Hoc Network Routing
: We propose a location-service to assist location-based routing protocols, realised through our Associativity-Based Clustering protocol. The main goal of our scheme, which employs...
Sivapathalingham Sivavakeesar, George Pavlou