Sciweavers

6195 search results - page 171 / 1239
» Cloud Computing Security
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
14 years 11 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
JNCA
2010
85views more  JNCA 2010»
14 years 11 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
EUROCRYPT
2011
Springer
14 years 8 months ago
Towards a Game Theoretic View of Secure Computation
Gilad Asharov, Ran Canetti, Carmit Hazay
ATAL
2011
Springer
14 years 4 months ago
Improved computational models of human behavior in security games
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...
IACR
2011
89views more  IACR 2011»
14 years 4 months ago
Concurrently Secure Computation in Constant Rounds
Sanjam Garg, Vipul Goyal, Abhishek Jain 0002, Amit...