Sciweavers

2927 search results - page 188 / 586
» Secure Distributed Human Computation
Sort
View
WICON
2008
15 years 3 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
NOSSDAV
2009
Springer
15 years 9 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
ICISC
2003
89views Cryptology» more  ICISC 2003»
15 years 3 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
JCM
2008
75views more  JCM 2008»
15 years 2 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
ICPR
2004
IEEE
16 years 3 months ago
Motion Capture Based on Color Error Maps in a Distributed Collaborative Environment
In this paper a composite framework for collaborative working is presented. The framework includes real-time motion tracking based on computer vision from standard webcams situate...
Alberto Del Bimbo, Alessandro Valli, Fabio Pucci, ...