Sciweavers

21520 search results - page 36 / 4304
» Symmetric network computation
Sort
View
PERCOM
2011
ACM
13 years 1 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
RTSS
2007
IEEE
14 years 4 months ago
Castor: Secure Code Updates Using Symmetric Cryptosystems
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
DCC
2008
IEEE
14 years 9 months ago
Distorting symmetric designs
A simple replacement approach is used to construct new symmetric and affine designs from projective or affine spaces. This is used to construct symmetric designs with a given autom...
Ulrich Dempwolff, William M. Kantor
FOCM
2010
91views more  FOCM 2010»
13 years 8 months ago
On the Ranks and Border Ranks of Symmetric Tensors
Motivated by questions arising in signal processing, computational complexity, and other areas, we study the ranks and border ranks of symmetric tensors using geometric methods. We...
J. M. Landsberg, Zach Teitler
ICNP
2003
IEEE
14 years 3 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...