Sign in
EUC (2)
2008
2008
2008
Keyphrases
Publications
2008
Kang Chen
,
Jun Xin
,
Weimin Zheng
VirtualCluster: Customizing the Cluster Environment through Virtual Machines.
EUC (2)
(2008)
Guanling Chen
,
Faruq Rahman
Analyzing Privacy Designs of Mobile Social Networking Applications.
EUC (2)
(2008)
Eunhoe Kim
,
Jaeyoung Choi
A Context Management System for Supporting Context-Aware Applications.
EUC (2)
(2008)
Reza Azarderakhsh
,
Arash Reyhani-Masoleh
,
Zine-Eddine Abid
A Key Management Scheme for Cluster Based Wireless Sensor Networks.
EUC (2)
(2008)
Longjun Zhang
,
Tao Zou
An Improved Key Management Scheme for WEP.
EUC (2)
(2008)
Lei He
,
Xiangjie Ma
,
Weili Zhang
,
Yunfei Guo
,
Hailong Ma
The Analysis and Simulation of a Hybrid Video Broadcast Architecture.
EUC (2)
(2008)
Gyeongtaek Lee
,
Jonghun Shin
,
Dae-Won Park
,
Hyuk-Chul Kwon
Discovery Architecture for the Tracing of Products in the EPCglobal Network.
EUC (2)
(2008)
Usman Ashraf
,
Slim Abdellatif
,
Guy Juanole
Route Stability in Wireless Mesh Access Networks.
EUC (2)
(2008)
Jiang Han
,
Qiuliang Xu
,
Guohua Chen
Efficient ID-based Threshold Ring Signature scheme.
EUC (2)
(2008)
Jiangwei Zhou
,
Boqin Feng
,
Gangqiang Wei
A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols.
EUC (2)
(2008)
Qi Liu
,
Nigel Linge
A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment.
EUC (2)
(2008)
Chien-Pen Chuang
,
Tin-Ying Huang
,
Li-Chi Yeh
Encryption and Decryption with Space Transformation for Bi-directional Association.
EUC (2)
(2008)
S. Sharmila Deva Selvi
,
S. Sree Vivek
,
C. Pandu Rangan
,
Neha Jain
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme.
EUC (2)
(2008)
Longjun Zhang
,
Tao Zou
A Trusted Third Party Based Secure Authentication Scheme of E-Commerce.
EUC (2)
(2008)
Haojun Zhang
,
Xiaoxue Li
,
Rui Ren
A Novel Self-Renewal Hash Chain and Its Implementation.
EUC (2)
(2008)
Shan Ding
,
Zhiqiang Xie
,
Xiaona Yin
A GA-based Systematic Message Scheduling Method for Time-Triggered CAN.
EUC (2)
(2008)
Feilong Tang
,
Minyi Guo
,
Minglu Li
,
Zhijun Wang
,
Zixue Cheng
Scalable and Secure Routing for Large-Scale Sensor Networks.
EUC (2)
(2008)
Wenjun Xiao
,
Mingxin He
,
Wenhong Wei
CayleyChord: A Novel P2P Overlay Network.
EUC (2)
(2008)
Maw-Jinn Tsaur
,
Wei-Chi Ku
,
Hao-Rung Chung
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications.
EUC (2)
(2008)
Zhenyu Wang
,
Xiangdong Li
,
Lining Yao
,
Qi Feng
,
Ruimin Wang
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology.
EUC (2)
(2008)
Yue Zhang
,
James B. D. Joshi
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy.
EUC (2)
(2008)
Bhavani M. Thuraisingham
,
Pranav Parikh
Trustworthy Semantic Web Technologies for Secure Knowledge Management.
EUC (2)
(2008)
Nicolai Kuntze
,
Julian Schütte
Securing Decentralized Workflows in Ambient Environments.
EUC (2)
(2008)
Christos Xenakis
,
Danae Apostolopoulou
,
Angeliki Panou
,
Ioannis Stavrakakis
A Qualitative Risk Analysis for the GPRS Technology.
EUC (2)
(2008)
Chun-Chieh Lin
,
Chuen-Liang Chen
Object Placement for Fully Associative Cache.
EUC (2)
(2008)
Nicole R. Nagel
,
Ruzbeh Shokranian
,
Jacir Luiz Bordim
,
Koji Nakano
MAC Layer Misbehavior on Ad Hoc Networks.
EUC (2)
(2008)
Phil-Jung Yun
,
Changhwa Kim
,
Sangkyung Kim
ELM-MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC Protocol.
EUC (2)
(2008)
Ke Xu
,
Yahui Yang
,
Tao Chen
Improving BitTorrent Network's Performance via Deploying Helpers.
EUC (2)
(2008)
Ping Li
,
Jiaying Wu
,
Jingming Xue
Research on Pairwise Key Establishment for Cluster Heads in Sensor Networks.
EUC (2)
(2008)
Jiong Yu
,
Guozhong Tian
,
Ling Cheng
Allocating Resource in Grid Workflow Based on State Prediction.
EUC (2)
(2008)
Jun Li
,
Bruce Christianson
A Domain-Oriented Approach for Access Control in Pervasive Environments.
EUC (2)
(2008)
Dineshbalu Balakrishnan
,
Amiya Nayak
,
Pulak Dhar
CSON-D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous Networking.
EUC (2)
(2008)
Baokang Zhao
,
Dan Wang
,
Zili Shao
,
Jiannong Cao
,
Keith C. C. Chan
,
Jinshu Su
,
Yanqin Yang
Towards Successive Privacy Protection in Sensor Networks.
EUC (2)
(2008)
Yubin Xia
,
Yan Niu
,
Yansong Zheng
,
Ning Jia
,
Chun Yang
,
Xu Cheng
Analysis and Enhancement for Interactive-Oriented Virtual Machine Scheduling.
EUC (2)
(2008)
Bing Guo
,
Yan Shen
,
Lei Zhang
,
Xiang Zhou
Research and Design of Shared Resources Competition Solution among Hardware-Software Tasks based on Unified Scheduling.
EUC (2)
(2008)
Sharon Fan
,
Jeffrey Fan
,
Kia Makki
,
Niki Pissinou
Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks.
EUC (2)
(2008)
Raphael C.-W. Phan
,
Bok-Min Goi
Attacks on Improved Key Distribution Protocols with Perfect Reparability.
EUC (2)
(2008)
Omar Hasan
,
Jean-Marc Pierson
,
Lionel Brunie
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation.
EUC (2)
(2008)
Jianhua Che
,
Qinming He
,
Qinghua Gao
,
Dawei Huang
Performance Measuring and Comparing of Virtual Machine Monitors.
EUC (2)
(2008)
Yanfei Liu
An Efficient RFID Authentication Protocol for Low-Cost Tags.
EUC (2)
(2008)
2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops
EUC (2)
(2008)
Ying Jin
,
Zepeng Li
,
Da Wei
,
Lei Liu
Automatic Generation and Enforcement of Security Contract for Pervasive Application.
EUC (2)
(2008)
Simone Cintra Chagas
,
Eber Huanca Cayo
,
Koji Nakano
,
Jacir Luiz Bordim
The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM Networks.
EUC (2)
(2008)
Won-Hee Han
,
Sung-Won Kim
,
Sun-Mi Park
,
Chang-Wu Lee
,
Jong Hyuk Park
,
Young-Sik Jeong
Large-Scale USN Middleware Based on Context-Aware.
EUC (2)
(2008)
Tomasz Kaszuba
,
Krzysztof Rzadca
,
Adam Wierzbicki
Discovering the Most Trusted Agents without Central Control.
EUC (2)
(2008)
Dong Zhou
,
Hiroshi Inamura
Towards Trustworthy and Secure Kiosk Computing for Mobile Users.
EUC (2)
(2008)
Biming Tian
,
Song Han
,
Tharam S. Dillon
A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks.
EUC (2)
(2008)
Qiming Pan
,
Xiaoxia Huang
Mean-Variance Model for International Portfolio Selection.
EUC (2)
(2008)
Gaurav Kapoor
,
Wei Zhou
,
Selwyn Piramuthu
Distance Bounding Protocol for Multiple RFID Tag Authentication.
EUC (2)
(2008)
Apivadee Piyatumrong
,
Pascal Bouvry
,
Frédéric Guinand
,
Kittichai Lavangnananda
Trusted Spanning Tree for Delay Tolerant MANETs.
EUC (2)
(2008)