The SCEAS System
Navigation Menu

Conferences in DBLP

Embedded and Ubiquitous Computing (euc)
2008 (conf/euc/2008-2)


  1. Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  2. Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  3. A Sanitizing Signature Scheme with Indexing. [Citation Graph (, )][DBLP]


  4. Error Detection Schemes for CED in Block Ciphers. [Citation Graph (, )][DBLP]


  5. An Impact-Oriented Metric for Interference to Network Routing. [Citation Graph (, )][DBLP]


  6. User-Directed Privacy Protection in the Ubiquitous Environment. [Citation Graph (, )][DBLP]


  7. Provably Secure Trusted Access Protocol for WLAN Mesh Networks. [Citation Graph (, )][DBLP]


  8. Towards Trustworthy and Secure Kiosk Computing for Mobile Users. [Citation Graph (, )][DBLP]


  9. Automatic Generation and Enforcement of Security Contract for Pervasive Application. [Citation Graph (, )][DBLP]


  10. A Qualitative Risk Analysis for the GPRS Technology. [Citation Graph (, )][DBLP]


  11. Research of a Multi-dimension Measurement Trusting Model Based on Markov Chain. [Citation Graph (, )][DBLP]


  12. Convertible Undeniable Partially Blind Signature from Bilinear Pairings. [Citation Graph (, )][DBLP]


  13. Analyzing Privacy Designs of Mobile Social Networking Applications. [Citation Graph (, )][DBLP]


  14. Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. [Citation Graph (, )][DBLP]


  15. Privacy Engine for Context-Aware Enterprise Application Services. [Citation Graph (, )][DBLP]


  16. The Trustworthiness Based on Hash Chain in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  17. Trust Similarity Measure in Trust Model for P2P Networks. [Citation Graph (, )][DBLP]


  18. Distance Bounding Protocol for Multiple RFID Tag Authentication. [Citation Graph (, )][DBLP]


  19. Encryption and Decryption with Space Transformation for Bi-directional Association. [Citation Graph (, )][DBLP]


  20. Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. [Citation Graph (, )][DBLP]


  21. Online Signature Verification Algorithm Using Hill-Climbing Method. [Citation Graph (, )][DBLP]


  22. Converters for Designing Applied Cryptographic Protocols. [Citation Graph (, )][DBLP]


  23. A Novel Self-Renewal Hash Chain and Its Implementation. [Citation Graph (, )][DBLP]


  24. Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database. [Citation Graph (, )][DBLP]


  25. Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework. [Citation Graph (, )][DBLP]


  26. Towards Successive Privacy Protection in Sensor Networks. [Citation Graph (, )][DBLP]


  27. Markov Model-Based Handwritten Signature Verification. [Citation Graph (, )][DBLP]


  28. An Efficient RFID Authentication Protocol for Low-Cost Tags. [Citation Graph (, )][DBLP]


  29. Trustworthy Semantic Web Technologies for Secure Knowledge Management. [Citation Graph (, )][DBLP]


  30. An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. [Citation Graph (, )][DBLP]


  31. Efficient Client-to-Client Password Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  32. A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks. [Citation Graph (, )][DBLP]


  33. Research on Pairwise Key Establishment for Cluster Heads in Sensor Networks. [Citation Graph (, )][DBLP]


  34. A Key Management Scheme for Cluster Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  35. Key Management for Wireless Sensor Networks Using Trusted Neighbors. [Citation Graph (, )][DBLP]


  36. An Improved Key Management Scheme for WEP. [Citation Graph (, )][DBLP]


  37. Property Verification for Generic Access Control Models. [Citation Graph (, )][DBLP]


  38. ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication Framework. [Citation Graph (, )][DBLP]


  39. Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition. [Citation Graph (, )][DBLP]


  40. Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy. [Citation Graph (, )][DBLP]


  41. Identity Privacy Protection by Delayed Transmission in Pocket Switched Networks. [Citation Graph (, )][DBLP]


  42. A Domain-Oriented Approach for Access Control in Pervasive Environments. [Citation Graph (, )][DBLP]


  43. Using Context Quality Indicators for Improving Context-Based Access Control in Pervasive Environments. [Citation Graph (, )][DBLP]


  44. Trusted Spanning Tree for Delay Tolerant MANETs. [Citation Graph (, )][DBLP]


  45. Scalable and Secure Routing for Large-Scale Sensor Networks. [Citation Graph (, )][DBLP]


  46. Securing Wireless Sensor Networks Using Cluster Reformations. [Citation Graph (, )][DBLP]


  47. Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]


  48. HybridS: A Scheme for Secure Distributed Data Storage in WSNs. [Citation Graph (, )][DBLP]


  49. SARC: A Street-Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment. [Citation Graph (, )][DBLP]


  50. Exponential Hashing in Finite Fields. [Citation Graph (, )][DBLP]


  51. A Context Based Dynamic Access Control Model for Web Service. [Citation Graph (, )][DBLP]


  52. Secure and Verifiable P2P Card Games. [Citation Graph (, )][DBLP]


  53. Defending against the Propagation of Active Worms. [Citation Graph (, )][DBLP]


  54. Implementation and Evaluation of SIP-Based Secure VoIP Communication System. [Citation Graph (, )][DBLP]


  55. Securing Decentralized Workflows in Ambient Environments. [Citation Graph (, )][DBLP]


  56. An Application of Interval Analysis in Software Static Analysis. [Citation Graph (, )][DBLP]


  57. A Framework to Evaluate and Predict Performances in Virtual Machines Environment. [Citation Graph (, )][DBLP]


  58. Performance Measuring and Comparing of Virtual Machine Monitors. [Citation Graph (, )][DBLP]


  59. An Optimized COW Block Device Driver in VMM for Fast, On-Demand Software Deployment. [Citation Graph (, )][DBLP]


  60. Analysis and Enhancement for Interactive-Oriented Virtual Machine Scheduling. [Citation Graph (, )][DBLP]


  61. DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture. [Citation Graph (, )][DBLP]


  62. A Novel Virtual Grid Experiment Method in MedImGrid. [Citation Graph (, )][DBLP]


  63. VirtualCluster: Customizing the Cluster Environment through Virtual Machines. [Citation Graph (, )][DBLP]


  64. Allocating Resource in Grid Workflow Based on State Prediction. [Citation Graph (, )][DBLP]


  65. Cooperative Problem Solving Process Based on MAS_NP Model. [Citation Graph (, )][DBLP]


  66. Simple Certificateless Signature with Smart Cards. [Citation Graph (, )][DBLP]


  67. Efficient ID-based Threshold Ring Signature scheme. [Citation Graph (, )][DBLP]


  68. (In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map. [Citation Graph (, )][DBLP]


  69. UCaS: A Schedulability Analysis Tool for AADL Models. [Citation Graph (, )][DBLP]


  70. A GA-based Systematic Message Scheduling Method for Time-Triggered CAN. [Citation Graph (, )][DBLP]


  71. Reducing Context Switch Overhead with Compiler-Assisted Threading. [Citation Graph (, )][DBLP]


  72. Research and Design of Shared Resources Competition Solution among Hardware-Software Tasks based on Unified Scheduling. [Citation Graph (, )][DBLP]


  73. A Tiny Processing System for Education and Small Embedded Systems on the FPGAs. [Citation Graph (, )][DBLP]


  74. Object Placement for Fully Associative Cache. [Citation Graph (, )][DBLP]


  75. Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi-core Processor Simulator. [Citation Graph (, )][DBLP]


  76. A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  77. CayleyChord: A Novel P2P Overlay Network. [Citation Graph (, )][DBLP]


  78. Improving BitTorrent Network's Performance via Deploying Helpers. [Citation Graph (, )][DBLP]


  79. Adaptive Load Balancing for Lookups in Heterogeneous DHT. [Citation Graph (, )][DBLP]


  80. The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM Networks. [Citation Graph (, )][DBLP]


  81. The Analysis and Simulation of a Hybrid Video Broadcast Architecture. [Citation Graph (, )][DBLP]


  82. On the Impact of DoS Attacks on Secure Service Discovery. [Citation Graph (, )][DBLP]


  83. MAC Layer Misbehavior on Ad Hoc Networks. [Citation Graph (, )][DBLP]


  84. CSON-D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous Networking. [Citation Graph (, )][DBLP]


  85. Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. [Citation Graph (, )][DBLP]


  86. Discovery Architecture for the Tracing of Products in the EPCglobal Network. [Citation Graph (, )][DBLP]


  87. Analysis of Web Service Substitutability Based on Typed Pi-Calculus. [Citation Graph (, )][DBLP]


  88. A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment. [Citation Graph (, )][DBLP]


  89. An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  90. A Context Management System for Supporting Context-Aware Applications. [Citation Graph (, )][DBLP]


  91. Data Mining for Security Applications. [Citation Graph (, )][DBLP]


  92. A Trusted Third Party Based Secure Authentication Scheme of E-Commerce. [Citation Graph (, )][DBLP]


  93. Attacks on Improved Key Distribution Protocols with Perfect Reparability. [Citation Graph (, )][DBLP]


  94. Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation. [Citation Graph (, )][DBLP]


  95. Probabilistic Trust Management in Pervasive Computing. [Citation Graph (, )][DBLP]


  96. Discovering the Most Trusted Agents without Central Control. [Citation Graph (, )][DBLP]


  97. Large-Scale USN Middleware Based on Context-Aware. [Citation Graph (, )][DBLP]


  98. Mean-Variance Model for International Portfolio Selection. [Citation Graph (, )][DBLP]


  99. A Mobile Agent-Supported Web Services Testing Platform. [Citation Graph (, )][DBLP]


  100. Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater Speech Communication. [Citation Graph (, )][DBLP]


  101. Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN. [Citation Graph (, )][DBLP]


  102. ELM-MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC Protocol. [Citation Graph (, )][DBLP]


  103. Energy-Efficient Routing Protocol in Underwater Acoustic Sensor Networks. [Citation Graph (, )][DBLP]


  104. Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks. [Citation Graph (, )][DBLP]


  105. Scalable Uniformly-Distributed Clustering Mechanism for Sensor Networks. [Citation Graph (, )][DBLP]


  106. Point-to-Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  107. Omnet++ Based Simulation for Underwater Environment. [Citation Graph (, )][DBLP]


  108. On-Demand Deployment Algorithm for a Hybrid Sensor Network. [Citation Graph (, )][DBLP]


  109. An Improved Design of the Ubiquitous Learning System Based on Sensor Networks. [Citation Graph (, )][DBLP]


  110. A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols. [Citation Graph (, )][DBLP]


  111. Route Stability in Wireless Mesh Access Networks. [Citation Graph (, )][DBLP]


  112. A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002