×

Found 171 Documents (Results 1–100)

Toward real-time multi-objective optimization for bus service KPIs. (English) Zbl 07823856

Gusikhin, Oleg (ed.) et al., Informatics in control, automation and robotics. 18th international conference, ICINCO 2021, Lieusaint – Paris, France, July 6–8, 2021. Revised selected papers. Cham: Springer. Lect. Notes Electr. Eng. 1006, 18-36 (2023).
MSC:  90B06 90C29
PDFBibTeX XMLCite
Full Text: DOI

An application of twisted group rings in secure group communications. (English) Zbl 07822777

Silvestrov, Sergei (ed.) et al., Non-commutative and non-associative algebra and analysis structures. SPAS 2019. Selected papers based on the presentations at the international conference on stochastic processes and algebraic structures – from theory towards applications, Västerås, Sweden, September 30 – October 2, 2019. Cham: Springer. Springer Proc. Math. Stat. 426, 381-397 (2023).
MSC:  94A60 94A05 68P25
PDFBibTeX XMLCite
Full Text: DOI

Monitoring a fleet of autonomous vehicles through A* like algorithms and reinforcement learning. (English) Zbl 1522.90002

Fidanova, Stefka (ed.), Recent advances in computational optimization. Results of the workshop on computational optimization, WCO 2021. Cham: Springer. Stud. Comput. Intell. 1044, 111-133 (2022).
MSC:  90B06 90C59
PDFBibTeX XMLCite
Full Text: DOI HAL

Cheating-tolerant and threshold-based secure information exchange among propinquity of adversaries. (English) Zbl 1504.94076

Singh, Brahmjit (ed.) et al., Intelligent computing and communication systems. Singapore: Springer. Algorithms Intell. Syst., 105-113 (2021).
MSC:  94A15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Certificateless public key signature schemes from standard algorithms. (English) Zbl 1518.94110

Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 179-197 (2018).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Modeling key infection in large-scale sensor networks. (English) Zbl 1437.68030

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 265-275 (2018).
MSC:  68M18 68M25
PDFBibTeX XMLCite
Full Text: DOI

Light weight key establishment scheme for wireless sensor networks. (English) Zbl 1448.94210

Carlet, Claude (ed.) et al., Security, privacy, and applied cryptography engineering. 6th international conference, SPACE 2016, Hyderabad, India, December 14–18, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10076, 124-137 (2016).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

LightCore: lightweight collaborative editing cloud services for sensitive data. (English) Zbl 1459.68015

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 215-239 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Secure one-to-group communications escrow-free ID-based asymmetric group key agreement. (English) Zbl 1347.94065

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 239-254 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure key management in the cloud. (English) Zbl 1318.68046

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 270-289 (2013).
PDFBibTeX XMLCite
Full Text: DOI

RIKE: using revocable identities to support key escrow in PKIs. (English) Zbl 1319.94086

Bao, Feng (ed.) et al., Applied cryptography and network security. 10th international conference, ACNS 2012, Singapore, June 26–29, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31283-0/pbk). Lecture Notes in Computer Science 7341, 48-65 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Optimizing segment based document protection. (English) Zbl 1302.68113

Bieliková, Mária (ed.) et al., SOFSEM 2012: Theory and practice of computer science. 38th conference on current trends in theory and practice of computer science, Špindlerův Mlýn, Czech Republic, January 21–27, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27659-0/pbk). Lecture Notes in Computer Science 7147, 566-575 (2012).
MSC:  68P25 68R10
PDFBibTeX XMLCite
Full Text: DOI

Kalwen+: practical key management schemes for gossip-based wireless medical sensor networks. (English) Zbl 1295.94073

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 268-283 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Key predistribution in wireless sensor networks when sensors are within communication range. (English) Zbl 1264.68016

Nikoletseas, Sotiris (ed.) et al., Theoretical aspects of distributed computing in sensor networks. Berlin: Springer (ISBN 978-3-642-14848-4/hbk; 978-3-642-14849-1/ebook). Monographs in Theoretical Computer Science. An EATCS Series, 787-832 (2011).
MSC:  68M10 94A62
PDFBibTeX XMLCite
Full Text: DOI

Security and trust in sensor networks. (English) Zbl 1231.68065

Nikoletseas, Sotiris (ed.) et al., Theoretical aspects of distributed computing in sensor networks. Berlin: Springer (ISBN 978-3-642-14848-4/hbk; 978-3-642-14849-1/ebook). Monographs in Theoretical Computer Science. An EATCS Series, 697-739 (2011).
PDFBibTeX XMLCite
Full Text: DOI

A solution for secure SIP conferencing over IMS and SAE. (English) Zbl 1231.94063

Grigoriu, Mircea (ed.) et al., European computing conference. Proceedings of the 4th European computing conference (ECC’10), Bucarest, Romania, April 20–22, 2010. Athens: World Scientific and Engineering Academy and Society (WSEAS) (ISBN 978-960-474-183-0/CD-ROM; 978-960-474-178-6/hbk). Electrical and Computer Engineering Series. A Series of Reference Books and Textbooks., 224-229 (2010).
MSC:  94A62
PDFBibTeX XMLCite

A forward-secure symmetric-key derivation protocol. How to improve classical DUKPT. (English) Zbl 1253.94041

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 250-267 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Protecting sensitive information in directory services using virtual directories. (English) Zbl 1184.68232

Bertino, Elisa (ed.) et al., Collaborative computing: networking, applications and worksharing. 4th international ICST conference, CollaborateCom 2008, Orlando, FL, USA, November 13–16, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03353-7/pbk; 978-3-642-03354-4/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 10, 244-257 (2009).
MSC:  68P25
PDFBibTeX XMLCite
Full Text: DOI

Secure and efficient group key agreements for cluster based networks. (English) Zbl 1239.68012

Gavrilova, Marina L. (ed.) et al., Transactions on Computational Science IV. Special issue on security in computing. Berlin: Springer (ISBN 978-3-642-01003-3/pbk). Lecture Notes in Computer Science 5430. Journal Subline, 87-116 (2009).
MSC:  68M10 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Design of a secure chat application based on AES cryptographic algorithm and key management. (English) Zbl 1339.94035

Mastorakis, Nikos E. (ed.) et al., Mathematical methods, computational techniques, non-linear systems, intelligent systems. Proceedings of the WSEAS international conferences, Corfu Island, Greece, October 26–28, 2008: 10th WSEAS international conference on mathematical methods, computational techniques and intelligent systems (MAMECTIS ’08), 7th WSEAS international conference on non-linear analysis, non-linear systems and chaos (NOLASC ’08), 8th WSEAS international conference on wavelet analysis and multirate systems (WAMUS ’08). Athens: WSEAS Press (ISBN 978-960-474-012-3/hbk; 978-960-6766-55-8/cd-rom). Mathematics and Computers in Science and Engineering. A Series of Reference Books and Textbooks, 486-491 (2008).
MSC:  94A60
PDFBibTeX XMLCite

An application-oriented framework for wireless sensor network key establishment. (English) Zbl 1277.94061

Di Crescenzo, Giovanni (ed.) et al., Proceedings of the third workshop on cryptography for ad-hoc networks (WCAN 2007), Wrocław, Poland, July 8, 2007. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 192, No. 2, 31-41 (2008).
MSC:  94A62 68M10
PDFBibTeX XMLCite
Full Text: DOI

Key management based on hierarchical secret sharing in ad-hoc networks. (English) Zbl 1166.94339

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 182-191 (2008).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Group key management: From a non-hierarchical to a hierarchical structure. (English) Zbl 1203.94096

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 213-225 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software