Sciweavers

24188 search results - page 322 / 4838
» Computing on Encrypted Data
Sort
View
CNSM
2010
15 years 2 months ago
Rule-based SLA management for revenue maximisation in Cloud Computing Markets
This paper introduces several Business Rules for maximising the revenue of Providers in Cloud Computing Markets. These rules apply in both negotiation and execution time, and enfor...
Mario Macías, Josep Oriol Fitó, Jord...
ICONS
2008
IEEE
15 years 10 months ago
An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three
DL systems with bilinear structure recently became an important base for cryptographic protocols such as identity-based encryption (IBE). Since the main computational task is the ...
Giray Kömürcü, Erkay Savas
ACMSE
2004
ACM
15 years 9 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
ICPP
2002
IEEE
15 years 9 months ago
Integrating Trust into Grid Resource Management Systems
Grid computing systems that have been the focus of much research activities in recent years provide a virtual framework for controlled sharing of resources across institutional bo...
Farag Azzedin, Muthucumaru Maheswaran
CRYPTO
2011
Springer
179views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Smaller Decoding Exponents: Ball-Collision Decoding
Very few public-key cryptosystems are known that can encrypt and decrypt in time b2+o(1) with conjectured security level 2b against conventional computers and quantum computers. Th...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...