Sciweavers

2207 search results - page 328 / 442
» Security at the Internet Layer
Sort
View
ICISC
2004
96views Cryptology» more  ICISC 2004»
15 years 6 months ago
Efficient Broadcast Encryption Using Multiple Interpolation Methods
We propose a new broadcast encryption scheme based on polynomial interpolations. Our scheme, obtained from the Naor-Pinkas scheme by partitioning the user set and interpolating mul...
Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwa...
141
Voted
ETFA
2008
IEEE
15 years 4 months ago
Self-configuration of an adaptive TDMA wireless communication protocol for teams of mobile robots
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such...
Frederico Santos, Luís Almeida, Luís...
DI
2006
67views more  DI 2006»
15 years 4 months ago
A portable network forensic evidence collector
A small portable network forensic evidence collection device is presented which is built using inexpensive embedded hardware and open source software. The device oers several mode...
Bruce J. Nikkel
COMCOM
2007
94views more  COMCOM 2007»
15 years 4 months ago
Distributed inter-domain lightpath provisioning in the presence of wavelength conversion
Dense wavelength division multiplexing (DWDM) has become the dominant transport layer technology for next-generation backbone networks due to its unprecedented capacity scalabilit...
Qing Liu, Nasir Ghani, Nageswara S. V. Rao, Ashwin...
PERVASIVE
2008
Springer
15 years 4 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...