Sciweavers

478 search results - page 84 / 96
» Secure Sockets Layer
Sort
View
ISSA
2008
13 years 9 months ago
The IP Protection of Electronic Databases: Copyright or Copywrong?
The protection of the intellectual investments embodied in databases is of the utmost importance. Technological innovation has rendered databases vulnerable to unauthorised access...
Tana Pistorius
NETWORKING
2008
13 years 9 months ago
Resilience to Dropping Nodes in Mobile Ad Hoc Networks with Link-State Routing
Currently emerging standard routing protocols for MANETs do not perform well in presence of malicious nodes that intentionally drop data traffic but otherwise behave correctly with...
Ignacy Gawedzki, Khaldoun Al Agha
MASCOTS
2007
13 years 9 months ago
A Hierarchical Connected Dominating Set Based Clustering Algorithm for Mobile Ad Hoc Networks
— We propose a hierarchical Connected Dominating Set (CDS) based algorithm for clustering in Mobile Ad hoc Networks (MANETs). Our algorithm is an extension of our previous Connec...
Deniz Cokuslu, Kayhan Erciyes
ICISC
2004
96views Cryptology» more  ICISC 2004»
13 years 8 months ago
Efficient Broadcast Encryption Using Multiple Interpolation Methods
We propose a new broadcast encryption scheme based on polynomial interpolations. Our scheme, obtained from the Naor-Pinkas scheme by partitioning the user set and interpolating mul...
Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwa...
ETFA
2008
IEEE
13 years 7 months ago
Self-configuration of an adaptive TDMA wireless communication protocol for teams of mobile robots
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such...
Frederico Santos, Luís Almeida, Luís...