Sciweavers

5891 search results - page 185 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
COMCOM
2007
94views more  COMCOM 2007»
15 years 4 months ago
Distributed inter-domain lightpath provisioning in the presence of wavelength conversion
Dense wavelength division multiplexing (DWDM) has become the dominant transport layer technology for next-generation backbone networks due to its unprecedented capacity scalabilit...
Qing Liu, Nasir Ghani, Nageswara S. V. Rao, Ashwin...
ICDCSW
2008
IEEE
15 years 11 months ago
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzh...
138
Voted
HPCC
2005
Springer
15 years 10 months ago
A Multi-scale Computational Approach for Nanoparticle Growth in Combustion Environments
In this paper a new and powerful computer simulation capability for the characterization of carbonaceous nanoparticle assemblies across multiple, connected scales, starting from th...
Angela Violi, Gregory A. Voth
SAC
2002
ACM
15 years 4 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
IPPS
1998
IEEE
15 years 8 months ago
Performance Analysis of a Fault-Tolerant Scheme for Location Management of Mobile Hosts
We consider the problem of location management of mobile users. The objective is to keep track of the mobile users in order to deliver calls. The IS-41 is a simple strategy for loc...
Saad Biaz, Nitin H. Vaidya