|
Conferences in DBLP
Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]
A Sanitizing Signature Scheme with Indexing. [Citation Graph (, )][DBLP]
Error Detection Schemes for CED in Block Ciphers. [Citation Graph (, )][DBLP]
An Impact-Oriented Metric for Interference to Network Routing. [Citation Graph (, )][DBLP]
User-Directed Privacy Protection in the Ubiquitous Environment. [Citation Graph (, )][DBLP]
Provably Secure Trusted Access Protocol for WLAN Mesh Networks. [Citation Graph (, )][DBLP]
Towards Trustworthy and Secure Kiosk Computing for Mobile Users. [Citation Graph (, )][DBLP]
Automatic Generation and Enforcement of Security Contract for Pervasive Application. [Citation Graph (, )][DBLP]
A Qualitative Risk Analysis for the GPRS Technology. [Citation Graph (, )][DBLP]
Research of a Multi-dimension Measurement Trusting Model Based on Markov Chain. [Citation Graph (, )][DBLP]
Convertible Undeniable Partially Blind Signature from Bilinear Pairings. [Citation Graph (, )][DBLP]
Analyzing Privacy Designs of Mobile Social Networking Applications. [Citation Graph (, )][DBLP]
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. [Citation Graph (, )][DBLP]
Privacy Engine for Context-Aware Enterprise Application Services. [Citation Graph (, )][DBLP]
The Trustworthiness Based on Hash Chain in Wireless Sensor Network. [Citation Graph (, )][DBLP]
Trust Similarity Measure in Trust Model for P2P Networks. [Citation Graph (, )][DBLP]
Distance Bounding Protocol for Multiple RFID Tag Authentication. [Citation Graph (, )][DBLP]
Encryption and Decryption with Space Transformation for Bi-directional Association. [Citation Graph (, )][DBLP]
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. [Citation Graph (, )][DBLP]
Online Signature Verification Algorithm Using Hill-Climbing Method. [Citation Graph (, )][DBLP]
Converters for Designing Applied Cryptographic Protocols. [Citation Graph (, )][DBLP]
A Novel Self-Renewal Hash Chain and Its Implementation. [Citation Graph (, )][DBLP]
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database. [Citation Graph (, )][DBLP]
Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework. [Citation Graph (, )][DBLP]
Towards Successive Privacy Protection in Sensor Networks. [Citation Graph (, )][DBLP]
Markov Model-Based Handwritten Signature Verification. [Citation Graph (, )][DBLP]
An Efficient RFID Authentication Protocol for Low-Cost Tags. [Citation Graph (, )][DBLP]
Trustworthy Semantic Web Technologies for Secure Knowledge Management. [Citation Graph (, )][DBLP]
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. [Citation Graph (, )][DBLP]
Efficient Client-to-Client Password Authenticated Key Exchange. [Citation Graph (, )][DBLP]
A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks. [Citation Graph (, )][DBLP]
Research on Pairwise Key Establishment for Cluster Heads in Sensor Networks. [Citation Graph (, )][DBLP]
A Key Management Scheme for Cluster Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Key Management for Wireless Sensor Networks Using Trusted Neighbors. [Citation Graph (, )][DBLP]
An Improved Key Management Scheme for WEP. [Citation Graph (, )][DBLP]
Property Verification for Generic Access Control Models. [Citation Graph (, )][DBLP]
ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication Framework. [Citation Graph (, )][DBLP]
Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition. [Citation Graph (, )][DBLP]
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy. [Citation Graph (, )][DBLP]
Identity Privacy Protection by Delayed Transmission in Pocket Switched Networks. [Citation Graph (, )][DBLP]
A Domain-Oriented Approach for Access Control in Pervasive Environments. [Citation Graph (, )][DBLP]
Using Context Quality Indicators for Improving Context-Based Access Control in Pervasive Environments. [Citation Graph (, )][DBLP]
Trusted Spanning Tree for Delay Tolerant MANETs. [Citation Graph (, )][DBLP]
Scalable and Secure Routing for Large-Scale Sensor Networks. [Citation Graph (, )][DBLP]
Securing Wireless Sensor Networks Using Cluster Reformations. [Citation Graph (, )][DBLP]
Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]
HybridS: A Scheme for Secure Distributed Data Storage in WSNs. [Citation Graph (, )][DBLP]
SARC: A Street-Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment. [Citation Graph (, )][DBLP]
Exponential Hashing in Finite Fields. [Citation Graph (, )][DBLP]
A Context Based Dynamic Access Control Model for Web Service. [Citation Graph (, )][DBLP]
Secure and Verifiable P2P Card Games. [Citation Graph (, )][DBLP]
Defending against the Propagation of Active Worms. [Citation Graph (, )][DBLP]
Implementation and Evaluation of SIP-Based Secure VoIP Communication System. [Citation Graph (, )][DBLP]
Securing Decentralized Workflows in Ambient Environments. [Citation Graph (, )][DBLP]
An Application of Interval Analysis in Software Static Analysis. [Citation Graph (, )][DBLP]
A Framework to Evaluate and Predict Performances in Virtual Machines Environment. [Citation Graph (, )][DBLP]
Performance Measuring and Comparing of Virtual Machine Monitors. [Citation Graph (, )][DBLP]
An Optimized COW Block Device Driver in VMM for Fast, On-Demand Software Deployment. [Citation Graph (, )][DBLP]
Analysis and Enhancement for Interactive-Oriented Virtual Machine Scheduling. [Citation Graph (, )][DBLP]
DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture. [Citation Graph (, )][DBLP]
A Novel Virtual Grid Experiment Method in MedImGrid. [Citation Graph (, )][DBLP]
VirtualCluster: Customizing the Cluster Environment through Virtual Machines. [Citation Graph (, )][DBLP]
Allocating Resource in Grid Workflow Based on State Prediction. [Citation Graph (, )][DBLP]
Cooperative Problem Solving Process Based on MAS_NP Model. [Citation Graph (, )][DBLP]
Simple Certificateless Signature with Smart Cards. [Citation Graph (, )][DBLP]
Efficient ID-based Threshold Ring Signature scheme. [Citation Graph (, )][DBLP]
(In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map. [Citation Graph (, )][DBLP]
UCaS: A Schedulability Analysis Tool for AADL Models. [Citation Graph (, )][DBLP]
A GA-based Systematic Message Scheduling Method for Time-Triggered CAN. [Citation Graph (, )][DBLP]
Reducing Context Switch Overhead with Compiler-Assisted Threading. [Citation Graph (, )][DBLP]
Research and Design of Shared Resources Competition Solution among Hardware-Software Tasks based on Unified Scheduling. [Citation Graph (, )][DBLP]
A Tiny Processing System for Education and Small Embedded Systems on the FPGAs. [Citation Graph (, )][DBLP]
Object Placement for Fully Associative Cache. [Citation Graph (, )][DBLP]
Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi-core Processor Simulator. [Citation Graph (, )][DBLP]
A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks. [Citation Graph (, )][DBLP]
CayleyChord: A Novel P2P Overlay Network. [Citation Graph (, )][DBLP]
Improving BitTorrent Network's Performance via Deploying Helpers. [Citation Graph (, )][DBLP]
Adaptive Load Balancing for Lookups in Heterogeneous DHT. [Citation Graph (, )][DBLP]
The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM Networks. [Citation Graph (, )][DBLP]
The Analysis and Simulation of a Hybrid Video Broadcast Architecture. [Citation Graph (, )][DBLP]
On the Impact of DoS Attacks on Secure Service Discovery. [Citation Graph (, )][DBLP]
MAC Layer Misbehavior on Ad Hoc Networks. [Citation Graph (, )][DBLP]
CSON-D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous Networking. [Citation Graph (, )][DBLP]
Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. [Citation Graph (, )][DBLP]
Discovery Architecture for the Tracing of Products in the EPCglobal Network. [Citation Graph (, )][DBLP]
Analysis of Web Service Substitutability Based on Typed Pi-Calculus. [Citation Graph (, )][DBLP]
A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment. [Citation Graph (, )][DBLP]
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Context Management System for Supporting Context-Aware Applications. [Citation Graph (, )][DBLP]
Data Mining for Security Applications. [Citation Graph (, )][DBLP]
A Trusted Third Party Based Secure Authentication Scheme of E-Commerce. [Citation Graph (, )][DBLP]
Attacks on Improved Key Distribution Protocols with Perfect Reparability. [Citation Graph (, )][DBLP]
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation. [Citation Graph (, )][DBLP]
Probabilistic Trust Management in Pervasive Computing. [Citation Graph (, )][DBLP]
Discovering the Most Trusted Agents without Central Control. [Citation Graph (, )][DBLP]
Large-Scale USN Middleware Based on Context-Aware. [Citation Graph (, )][DBLP]
Mean-Variance Model for International Portfolio Selection. [Citation Graph (, )][DBLP]
A Mobile Agent-Supported Web Services Testing Platform. [Citation Graph (, )][DBLP]
Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater Speech Communication. [Citation Graph (, )][DBLP]
Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN. [Citation Graph (, )][DBLP]
ELM-MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC Protocol. [Citation Graph (, )][DBLP]
Energy-Efficient Routing Protocol in Underwater Acoustic Sensor Networks. [Citation Graph (, )][DBLP]
Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks. [Citation Graph (, )][DBLP]
Scalable Uniformly-Distributed Clustering Mechanism for Sensor Networks. [Citation Graph (, )][DBLP]
Point-to-Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Omnet++ Based Simulation for Underwater Environment. [Citation Graph (, )][DBLP]
On-Demand Deployment Algorithm for a Hybrid Sensor Network. [Citation Graph (, )][DBLP]
An Improved Design of the Ubiquitous Learning System Based on Sensor Networks. [Citation Graph (, )][DBLP]
A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols. [Citation Graph (, )][DBLP]
Route Stability in Wireless Mesh Access Networks. [Citation Graph (, )][DBLP]
A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network. [Citation Graph (, )][DBLP]
|