Sciweavers

27 search results - page 2 / 6
» scn 2010
Sort
View
SCN
2010
Springer
127views Communications» more  SCN 2010»
13 years 8 months ago
Get Shorty via Group Signatures without Encryption
Patrik Bichsel, Jan Camenisch, Gregory Neven, Nige...
SCN
2010
Springer
109views Communications» more  SCN 2010»
13 years 8 months ago
malnets: large-scale malicious networks via compromised wireless access points
Patrick Traynor, Kevin R. B. Butler, William Enck,...
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 5 months ago
A guide to trust in mobile ad hoc networks
In this paper we examine issues of trust and reputation in Mobile Ad hoc Networks. We look at a number of the trust and reputation models that have been proposed and we highlight o...
Shane Balfe, Po-Wah Yau, Kenneth G. Paterson
TCOM
2010
108views more  TCOM 2010»
13 years 8 months ago
On the condition number distribution of complex wishart matrices
Abstract—This paper investigates the distribution of the condition number of complex Wishart matrices. Two closely related measures are considered: the standard condition number ...
Michail Matthaiou, Matthew R. McKay, Peter J. Smit...
SCN
2010
Springer
132views Communications» more  SCN 2010»
13 years 8 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente