Sciweavers

253 search results - page 36 / 51
» Distributed Authentication for Peer-to-Peer Networks
Sort
View
AINA
2005
IEEE
15 years 3 months ago
Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications
In the present study, THUBioGrid, an experimental distributed computing application for bioinformatics (BioGrid) is proposed. THUBioGrid incorporates directory services (data and ...
Chao-Tung Yang, Yi-Chun Hsiung, Heng-Chuan Kan
ICDCSW
2003
IEEE
15 years 2 months ago
Smart Furniture: Improvising Ubiquitous Hot-Spot Environment
We developed Smart Furniture, which extemporaneously converts the legacy non-smart space into a Smart Hot-spot which consists of computational services. Since the Smart Furniture ...
Masaki Ito, Akiko Iwaya, Masato Saito, Kenichi Nak...
AP2PC
2007
Springer
14 years 11 months ago
Design of a Secure and Decentralized Location Service for Agent Platforms
Abstract. Agent platforms designed for Internet-scale, open networks need scalable and secure location services for agents and services. The location service based on the Fonkey pu...
Benno J. Overeinder, Michel Oey, Reinier Timmer, R...
EUROPKI
2006
Springer
15 years 1 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
WISEC
2010
ACM
14 years 9 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...