Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Multiple clients"'
Publikováno v:
IEEE Access. 10:122796-122811
This work was supported in part by IHS Kurumsal Teknoloji A.S., and in part by the Tuerkiye Bilimsel ve Teknik Arastirma Kurumu(TUBITAK) under Grant 115E389 User Provided Network (UPN) is a promising solution for sharing the limited network resources
Autor:
Lee, Minhyung
In this thesis closed-loop control strategies over a communication network with multiple clients are developed. To accomplish this objective, a steel-ball magnetic-levitation system, a DC motor speed-control system, and an autonomous wheelchair robot
Externí odkaz:
http://hdl.handle.net/1969.1/ETD-TAMU-2009-08-891
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing the equality of two encrypted vectors. Our construction can be used for the privacy-preserving monitoring of relations among multiple clients. Since bot
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dris___00893::3cc96d6e90356b238d049408b2ddc211
http://resolver.tudelft.nl/uuid:543aca39-5e22-41a2-a648-09c0121369e3
http://resolver.tudelft.nl/uuid:543aca39-5e22-41a2-a648-09c0121369e3
Autor:
van de Kamp, Tim, Peter, Andreas, Everts, Maarten H., Jonker, Willem, Capkun, Srdjan, Chow, Sherman S.M.
Publikováno v:
ISSUE=16;TITLE=16th International Conference on Cryptology And Network Security 2017
16th International Conference on Cryptology and Network Security, CANS 2017, 30 November 2017 through 2 December 2017, Capkun, S.Chow, S.S.M., Lecture Notes in Computer Science, 11261 LNCS, 135-157
Cryptology and Network Security ISBN: 9783030026400
CANS
Cryptology and Network Security-16th International Conference, CANS 2017, Revised Selected Papers, 135-157
STARTPAGE=135;ENDPAGE=157;TITLE=Cryptology and Network Security-16th International Conference, CANS 2017, Revised Selected Papers
16th International Conference on Cryptology and Network Security, CANS 2017, 30 November 2017 through 2 December 2017, Capkun, S.Chow, S.S.M., Lecture Notes in Computer Science, 11261 LNCS, 135-157
Cryptology and Network Security ISBN: 9783030026400
CANS
Cryptology and Network Security-16th International Conference, CANS 2017, Revised Selected Papers, 135-157
STARTPAGE=135;ENDPAGE=157;TITLE=Cryptology and Network Security-16th International Conference, CANS 2017, Revised Selected Papers
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing the equality of two encrypted vectors. Our construction can be used for the privacy-preserving monitoring of relations among multiple clients. Since bot
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::53eb8433e374718b509f58e084c48410
https://research.utwente.nl/en/publications/multiclient-predicateonly-encryption-for-conjunctive-equality-tests(f3062f3c-8d8e-49c0-9ee6-58509e316606).html
https://research.utwente.nl/en/publications/multiclient-predicateonly-encryption-for-conjunctive-equality-tests(f3062f3c-8d8e-49c0-9ee6-58509e316606).html
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Information Forensics and Security, 3, 10, 445-457
We provide a generic framework that, with the help of a preprocessing phase that is independent of the inputs of the users, allows an arbitrary number of users to securely outsource a computation to two non-colluding external servers. Our approach is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e19c7b073b1516dc8a95c8dc971378ad
http://resolver.tudelft.nl/uuid:c9c2e7b3-e1c7-439c-a401-33bc71624ca1
http://resolver.tudelft.nl/uuid:c9c2e7b3-e1c7-439c-a401-33bc71624ca1
We provide a generic framework that, with the help of a preprocessing phase that is independent of the inputs of the users, allows an arbitrary number of users to securely outsource a computation to two non-colluding external servers. Our approach is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dris___00893::d77756d002ba83f0fe9a9df11cc117b3
http://resolver.tudelft.nl/uuid:c9c2e7b3-e1c7-439c-a401-33bc71624ca1
http://resolver.tudelft.nl/uuid:c9c2e7b3-e1c7-439c-a401-33bc71624ca1
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ICDCS
A primary challenge in multicasting video in a wireless LAN to multiple clients is to deal with the client diversity - clients may have different channel characteristics and hence receive different numbers of transmissions from the AP. A promising ap