Sciweavers

1648 search results - page 57 / 330
» Where to Build a Door
Sort
View
JCS
2011
126views more  JCS 2011»
13 years 4 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
EUROCRYPT
2012
Springer
12 years 5 days ago
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
We present a new approach for creating chosen ciphertext secure encryption. The focal point ork is a new abstraction that we call Detectable Chosen Ciphertext Security (DCCA). Int...
Susan Hohenberger, Allison B. Lewko, Brent Waters
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
14 years 4 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
3DGIS
2006
Springer
14 years 3 months ago
Conception of a 3D Geodata Web Service for the Support of Indoor Navigation with GNSS
This paper addresses the concept of a 3D Geodata Web Service for the support of indoor navigation with satellite-based positioning systems like Galileo or GPS. The presented work ...
Stephan Mäs, Wolfgang Reinhardt, Fei Wang
IAT
2005
IEEE
14 years 3 months ago
Multiagent Reputation Management to Achieve Robust Software Using Redundancy
This paper explains the building of robust software using multiagent reputation. One of the major goals of software engineering is to achieve robust software. Our hypothesis is th...
Rajesh Turlapati, Michael N. Huhns