Sciweavers

24529 search results - page 295 / 4906
» Computing on Authenticated Data
Sort
View
SPC
2005
Springer
15 years 9 months ago
Ephemeral Pairing on Anonymous Networks
The ephemeral pairing problem requires two or more specific physical nodes in a wireless broadcast network, that do not yet know each other, to establish a short-term relationship...
Jaap-Henk Hoepman
112
Voted
CHI
2003
ACM
15 years 9 months ago
ShownPass: an easy access control with a displayed password
Access control is one of the most important issue with ubiquitous networking environment. Traditional access control methods are mainly considering authentication of registered us...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
126
Voted
EAGC
2003
Springer
15 years 9 months ago
A Grid Framework for Optimistic Resource Sharing
: Grids are gaining more importance in this era of Internet technology to maximize the use of resources such as hardware and software infrastructure. The grid provides a platform t...
Norlaily Yaacob, Rahat Iqbal
HPDC
2002
IEEE
15 years 8 months ago
A Secure Distributed Search System
This paper presents the design, implementationand evaluation of Mingle, a secure distributed search system. Each participatinghost runs a Mingle server, which maintains an inverte...
Yinglian Xie, David R. O'Hallaron, Michael K. Reit...
ICDCSW
2002
IEEE
15 years 8 months ago
Switchboard: Secure, Monitored Connections for Client-Server Communication
Prolonged secure communication requires trust relationships that extend throughout a connection’s life cycle. Current tools to establish secure connections such as SSL/TLS and S...
Eric Freudenthal, Lawrence Port, Tracy Pesin, Edwa...