Sciweavers

71 search results - page 11 / 15
» Data protection in outsourcing scenarios: issues and directi...
Sort
View
CCS
2009
ACM
15 years 6 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
LCTRTS
2009
Springer
15 years 6 months ago
Software transactional memory for multicore embedded systems
Embedded systems, like general-purpose systems, can benefit from parallel execution on a symmetric multicore platform. Unfortunately, concurrency issues present in general-purpos...
Jennifer Mankin, David R. Kaeli, John Ardini
IEEEIAS
2009
IEEE
14 years 9 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
ADBIS
2003
Springer
99views Database» more  ADBIS 2003»
15 years 5 months ago
Towards Collaborative Video Authoring
It’s a long time since video post production became digital, yet the issue of collaborative video authoring has not been seriously investigated so far. In this paper we tackle th...
Boris Novikov, Oleg Proskurnin
ESCIENCE
2006
IEEE
15 years 3 months ago
Virtual Lab for fMRI: Bridging the Usability Gap
Grid technology can offer a powerful infrastructure for a broad spectrum of (scientific) application areas, but the uptake of grids by "real" applications has been slow....
Sílvia Delgado Olabarriaga, Piter T. de Boe...