Sciweavers

1834 search results - page 295 / 367
» Public Key Cryptography
Sort
View
DCOSS
2007
Springer
14 years 2 months ago
Distributed Coalition Formation in Visual Sensor Networks: A Virtual Vision Approach
Abstract. We propose a distributed coalition formation strategy for collaborative sensing tasks in camera sensor networks. The proposed model supports taskdependent node selection ...
Faisal Qureshi, Demetri Terzopoulos
IWDC
2004
Springer
510views Communications» more  IWDC 2004»
14 years 1 months ago
On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks
Abstract. The extension of Internet services to public transport passengers is slowly becoming inevitable. To this end, it is envisaged that high-speed local area networks will be ...
Muhammad Ali Malik, Salil S. Kanhere, Mahbub Hassa...
WMASH
2003
ACM
14 years 1 months ago
MobileNAT: a new technique for mobility across heterogeneous address spaces
We propose a new network layer mobility architecture called MOBILENAT to efficiently support micro and macro-mobility in and across heterogeneous address spaces common in emergin...
Milind M. Buddhikot, Adiseshu Hari, Kundan Singh, ...
CCS
2007
ACM
13 years 11 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
13 years 11 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...