Sciweavers

2282 search results - page 344 / 457
» Distributed Cryptographic Computing on Grid
Sort
View
CONCUR
2005
Springer
15 years 7 months ago
Selecting Theories and Recursive Protocols
Many decidability results are known for non-recursive cryptographic protocols, where the protocol steps can be expressed by simple rewriting rules. Recently, a tree transducer-base...
Tomasz Truderung
FC
2003
Springer
101views Cryptology» more  FC 2003»
15 years 7 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
ICITS
2009
14 years 11 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka
ATAL
2008
Springer
15 years 3 months ago
On the importance of migration for fairness in online grid markets
Computational grids offer users a simple access to tremendous computer resources for solving large scale computing problems. Traditional performance analysis of scheduling algorit...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
SIGMOD
2007
ACM
106views Database» more  SIGMOD 2007»
16 years 2 months ago
Highly distributed XQuery with DXQ
Many modern applications, from Grid computing to RSS handling, need to support data processing in a distributed environment. Currently, most such applications are implemented usin...
Jérôme Siméon, Kristi Morton, ...