Sciweavers

1229 search results - page 204 / 246
» Trusted Computing
Sort
View
ESAS
2007
Springer
14 years 1 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
EUROPAR
2007
Springer
14 years 1 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...
TAMC
2007
Springer
14 years 1 months ago
A Note on Universal Composable Zero Knowledge in Common Reference String Model
Pass observed that universal composable zero-knowledge (UCZK) protocols in the common reference string (CRS) model, where a common reference string is selected trustily by a truste...
Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao
VLDB
2007
ACM
229views Database» more  VLDB 2007»
14 years 1 months ago
Sum-Max Monotonic Ranked Joins for Evaluating Top-K Twig Queries on Weighted Data Graphs
In many applications, the underlying data (the web, an XML document, or a relational database) can be seen as a graph. These graphs may be enriched with weights, associated with t...
Yan Qi 0002, K. Selçuk Candan, Maria Luisa ...
WINE
2007
Springer
120views Economy» more  WINE 2007»
14 years 1 months ago
Public Advertisement Broker Markets
Motivated by the growth of various networked systems as potential market places, we study market models wherein, owing to the size of the markets, transactions take place between l...
Atish Das Sarma, Deeparnab Chakrabarty, Sreenivas ...