Sciweavers

1843 search results - page 299 / 369
» Securing Class Initialization
Sort
View
TMC
2010
210views more  TMC 2010»
13 years 8 months ago
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Rui Tan, Guoliang Xing, Jianping Wang, Hing-Cheung...
IJOE
2011
118views more  IJOE 2011»
13 years 4 months ago
Three Online Neutron Beam Experiments Based on the iLab Shared Architecture
- Students at MIT have traditionally executed certain experiments in the containment building of the MIT nuclear reactor as part of courses in Nuclear Engineering and the third yea...
Kimberly DeLong, Judson V. Harward, Philip H. Bail...
TSP
2010
13 years 4 months ago
Optimization and analysis of distributed averaging with short node memory
Distributed averaging describes a class of network algorithms for the decentralized computation of aggregate statistics. Initially, each node has a scalar data value, and the goal...
Boris N. Oreshkin, Mark Coates, Michael G. Rabbat
EUROCRYPT
2009
Springer
14 years 10 months ago
On the Portability of Generalized Schnorr Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design...
Jan Camenisch, Aggelos Kiayias, Moti Yung
SIGCOMM
2009
ACM
14 years 4 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...