Sciweavers

610 search results - page 108 / 122
» Predicate-Based Key Exchange
Sort
View
SIMPRA
2010
137views more  SIMPRA 2010»
13 years 5 months ago
Co-simulation for performance prediction of integrated building and HVAC systems - An analysis of solution characteristics using
Integrated performance simulation of buildings and heating, ventilation and airconditioning (HVAC) systems can help reducing energy consumption and increasing occupant comfort. Ho...
Marija Trcka, Jan L. M. Hensen, Michael Wetter
WCNC
2010
IEEE
13 years 5 months ago
Characterization of the Secrecy Region of a Single Relay Cooperative System
Abstract—Security is an important aspect for the future wireless networks. Since the number of network nodes increases constantly, and, in addition, the networks are decentralize...
Ninoslav Marina, Are Hjørungnes
ANTSW
2010
Springer
13 years 5 months ago
Coordinating Heterogeneous Swarms through Minimal Communication among Homogeneous Sub-swarms
robotics, the agents are often assumed to be identical. In this abstract, we argue that the cooperation between swarms of different kinds of robots can enhance the capabilities of ...
Carlo Pinciroli, Rehan O'Grady, Anders Lyhne Chris...
MOBISYS
2005
ACM
14 years 7 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
14 years 1 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...