Sciweavers

21520 search results - page 42 / 4304
» Symmetric network computation
Sort
View
WISEC
2009
ACM
14 years 5 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
ITCC
2005
IEEE
14 years 3 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis
IPPS
2008
IEEE
14 years 4 months ago
SNAP, Small-world Network Analysis and Partitioning: An open-source parallel graph framework for the exploration of large-scale
We present SNAP (Small-world Network Analysis and Partitioning), an open-source graph framework for exploratory study and partitioning of large-scale networks. To illustrate the c...
David A. Bader, Kamesh Madduri
ECCV
2006
Springer
15 years 3 days ago
Uncalibrated Factorization Using a Variable Symmetric Affine Camera
Abstract. In order to reconstruct 3-D Euclidean shape by the TomasiKanade factorization, one needs to specify an affine camera model such as orthographic, weak perspective, and par...
Ken-ichi Kanatani, Yasuyuki Sugaya, Hanno Ackerman...
ICON
2007
IEEE
14 years 4 months ago
A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of th...
Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Su...