搜索结果: 1-15 共查到“Ad Hoc”相关记录363条 . 查询时间(0.098 秒)
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) Impersonation attack Bogus message attack
2019/5/13
Protecting a driver’s privacy is one of the major concerns in vehicular ad hoc networks (VANETs). Currently, Azees et al. has proposed an efficient anonymous authentication protocol (EAAP) for VANETs....
Ad Hoc Multi-Input Functional Encryption
cryptographic protocols multi input functional encryption
2019/4/8
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent ...
Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
MPC threshold encryption obfuscation
2018/11/5
We explore large-scale fault-tolerant multiparty computation on a minimal communication graph. Our goal is to be able to privately aggregate data from thousands of users - for example, in order to obt...
Ad Hoc PSM Protocols: Secure Computation Without Coordination
Secure Computation Information-Theoretic Security Obfuscation
2017/2/21
We study the notion of {\em ad hoc secure computation}, recently introduced by Beimel et al. (ITCS 2016), in the context of the {\em Private Simultaneous Messages} (PSM) model of Feige et al.\ (STOC 2...
第15届移动,Ad Hoc和无线网络建模与优化国际研讨会(The 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks)
第15届 移动 Ad Hoc 无线网络建模与优化 国际研讨会
2017/2/15
The 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks solicits high-quality contributions.
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme
cryptographic protocols privacy requirements
2016/12/10
In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy ve...
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
secure computation smart cards implementation
2016/1/9
Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target f...
Performance Evaluation of Data Disseminations for Vehicular Ad Hoc Networks in Highway Scenarios
Data Dissemination Network Simulation Performance Evaluation Routing Protocols
2015/11/23
A vehicular ad hoc network (VANET) is a relatively new term for an old technology – a network that does not rely on pre-existing infrastructure. When integrated into the intelligent transportation sys...
Ad-Hoc Wireless Sensor Positioning in Hazardous Areas
Wireless Positioning Ad-hoc Sensor Networks Hazard Monitoring Network Adjustment Volcano Watch
2015/11/23
This paper investigates the capability of GNSS aided smart sensor network positioning based on Wireless Local Area Network (WLAN) signals incorporating access points, to monitor 3D deformation associa...
AD HOC MODEL GENERATION USING MULTISCALE LIDAR DATA FROM A GEOSPATIAL DATABASE
LIDAR Database Model Mapping Visualization Urban
2015/9/21
Due to the spread of economically priced laser scanning technology nowadays, especially in the field of topographic surveying and mapping, ever-growing amounts of data need to be handled. Depending on...
Resource allocation for QoS provisioning in wireless ad hoc networks
Reflection wireless network transmission data rate the network resources
2015/8/11
For wireless ad hoc networks with multihop transmissions and Rayleigh fading, this paper maximizes the overall system throughput subject to QoS constraints on power, probability of outage, and data ra...
QoS and fairness constrained convex optimization of resource allocation for wireless cellular and ad hoc networks
Wireless cellular network distribution network resources optimization
2015/8/11
For wireless cellular and ad hoc networks with QoS constraints, we propose a suite of problem formulations that allocate network resources to optimize SIR, maximize throughput, and minimize delay. The...
Optimal routes and flows in congestion constrained ad hoc networks
Network streaming media video voice data Internet function
2015/8/11
Future ad hoc and multi-hop networks will simultaneously support many different types of traffic such as streaming video, voice, and data. This is particularly true for emerging 802.11, bluetooth, or ...
Report of the Children&Adolescents Task Force of the Ad Hoc Committee on End-of-Life Issues
Report of the Children&Adolescents Task Force Ad Hoc Committee End-of-Life Issues
2015/7/23
Decline and death in childhood are profoundly sad and upsetting, regardless of circumstance, and there are no norms to guide our responses. The death of a child can be an especially difficult experien...
Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks
Resource Allocation QoS Provisioning Wireless Ad Hoc Networks
2015/7/10
For wireless ad hoc networks with multihop transmissions and Rayleigh fading, this paper maximizes the overall system throughput subject to QoS constraints on power, probability of outage, and data ra...