Sciweavers

2642 search results - page 71 / 529
» The development of Chez Scheme
Sort
View
PIMRC
2008
IEEE
14 years 4 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
ISSTA
2000
ACM
14 years 2 months ago
Classification schemes to aid in the analysis of real-time systems
This paper presents three sets of classification schemes for processes, properties, and transitions that can be used to assist in the analysis of real-time systems. These classifi...
Paul Z. Kolano, Richard A. Kemmerer
SIGGRAPH
1999
ACM
14 years 2 months ago
Subdivision Schemes for Fluid Flow
The motion of fluids has been a topic of study for hundredsof years. In its most general setting, fluid flow is governed by a system of non-linear partial differential equation...
Henrik Weimer, Joe D. Warren
ISADS
1999
IEEE
14 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ICPR
2004
IEEE
14 years 11 months ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang