We describe approaches for satisfying the real-time collision detection requirements of distributed virtual environments. We assume a distributed virtual environment is deployed u...
— This paper presents an Emergent Ad hoc Routing Algorithm with QoS provision (EARA-QoS). This ad hoc QoS routing algorithm is based on a swarm intelligence inspired routing infr...
Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Consta...
— There is industrial intent to use Powerline Communication (PLC) PLC networks in the home for delivery of multimedia data, with associated challenging quality of service (QoS) r...
Yu-Ju Lin, Haniph A. Latchman, Jonathan C. L. Liu,...
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Today, the use of anycast address is quite limited. One of the reasons is because there is no routing protocol providing a global anycasting service. In this paper we design and im...
In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented an efficient one-round tripartite authenticated key agreement protocol based on ...
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
The Location of nodes in sensor network is an important problem with application in resource allocation, location sensitive browsing, and emergency communications. A key problem i...
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...