Sciweavers

610 search results - page 51 / 122
» Predicate-Based Key Exchange
Sort
View
ELECTRONICMARKETS
2008
67views more  ELECTRONICMARKETS 2008»
13 years 8 months ago
Current Trends and Challenges in Electronic Procurement: An Empirical Study
The following paper presents results from a longitudinal study on the use of ICT for B2B-related business processes in large Swiss companies. In an empirical survey, 68 questionna...
Christian Tanner, Ralf Wölfle, Petra Schubert...
VTC
2010
IEEE
219views Communications» more  VTC 2010»
13 years 7 months ago
Decentralized Base Station Processing for Multiuser MIMO Downlink CoMP
—Coordinated multi-point transmission/reception (CoMP), in which base stations (BSs) cooperate during the downlink, has been identified as a tool for improving user rates and mi...
Winston W. L. Ho, Tony Q. S. Quek, Sumei Sun
ICDT
2012
ACM
251views Database» more  ICDT 2012»
11 years 11 months ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
ADVIS
2004
Springer
14 years 2 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan
WIMOB
2008
IEEE
14 years 3 months ago
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and ...
Giacomo de Meulenaer, François Gosset, Fran...