Sciweavers

AINA
2005
IEEE
14 years 2 months ago
Scalable Collision Detection for Massively Multiplayer Online Games
We describe approaches for satisfying the real-time collision detection requirements of distributed virtual environments. We assume a distributed virtual environment is deployed u...
Graham Morgan, Kier Storey
AINA
2005
IEEE
14 years 2 months ago
A Biologically Inspired QoS Routing Algorithm for Mobile Ad Hoc Networks
— This paper presents an Emergent Ad hoc Routing Algorithm with QoS provision (EARA-QoS). This ad hoc QoS routing algorithm is based on a swarm intelligence inspired routing infr...
Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Consta...
AINA
2005
IEEE
14 years 2 months ago
Periodic Contention-Free Multiple Access for Power Line Communication Networks
— There is industrial intent to use Powerline Communication (PLC) PLC networks in the home for delivery of multimedia data, with associated challenging quality of service (QoS) r...
Yu-Ju Lin, Haniph A. Latchman, Jonathan C. L. Liu,...
AINA
2005
IEEE
14 years 2 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
AINA
2005
IEEE
14 years 2 months ago
Dynamic Key Generations for Secret Sharing in Access Structures
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
AINA
2005
IEEE
14 years 2 months ago
Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SM
Today, the use of anycast address is quite limited. One of the reasons is because there is no routing protocol providing a global anycasting service. In this paper we design and im...
Satoshi Matsunaga, Shingo Ata, Hiroshi Kitamura, M...
AINA
2005
IEEE
14 years 2 months ago
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented an efficient one-round tripartite authenticated key agreement protocol based on ...
Chu-Hsing Lin, Hsiu-Hsia Lin
AINA
2005
IEEE
14 years 2 months ago
Efficient Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chu-Hsing Lin, Wei Lee
AINA
2005
IEEE
14 years 2 months ago
Nodes Localization through Data Fusion in Sensor Network
The Location of nodes in sensor network is an important problem with application in resource allocation, location sensitive browsing, and emergency communications. A key problem i...
Ren C. Luo, Ogst Chen, Liang Chao Tu
AINA
2005
IEEE
14 years 2 months ago
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang