Sciweavers

1449 search results - page 14 / 290
» Secure and Efficient Metering
Sort
View
IWSEC
2010
Springer
13 years 5 months ago
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
This paper presents efficient secure auction protocols for first price auction and second price auction. Previous auction protocols are based on a generally secure multi-party prot...
Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamo...
ICRA
2010
IEEE
242views Robotics» more  ICRA 2010»
13 years 6 months ago
Axel rover paddle wheel design, efficiency, and sinkage on deformable terrain
—This paper presents the Axel robotic rover which has been designed to provide robust and flexible access to extreme extra-planetary terrains. Axel is a lightweight 2wheeled vehi...
Pablo Abad-Manterola, Joel W. Burdick, Issa A. D. ...
CCS
2003
ACM
13 years 11 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
INFOCOM
2010
IEEE
13 years 5 months ago
Distributed Coordination with Deaf Neighbors: Efficient Medium Access for 60 GHz Mesh Networks
Multi-gigabit outdoor mesh networks operating in the unlicensed 60 GHz "millimeter (mm) wave" band, offer the possibility of a quickly deployable broadband extension of t...
Sumit Singh, Raghuraman Mudumbai, Upamanyu Madhow
EUROCRYPT
2007
Springer
13 years 11 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas