Sciweavers

2139 search results - page 104 / 428
» Distributed computing and computer security education
Sort
View
119
Voted
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 3 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
124
Voted
EUC
2007
Springer
15 years 9 months ago
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main ...
Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashra...
106
Voted
ITICSE
2004
ACM
15 years 8 months ago
Evaluating the effectiveness of ICT to support globally distributed PBL teams
In the 21st century it is becoming increasingly common to work and learn in teams that are globally distributed. Such teams rely heavily on ICT to facilitate communication. There ...
Chew Swee Cheng, Chris Beaumont
117
Voted
WISTP
2010
Springer
15 years 9 months ago
Trust in Peer-to-Peer Content Distribution Protocols
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
127
Voted
COLCOM
2008
IEEE
15 years 4 months ago
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers i...
Tuan Phan, Danfeng (Daphne) Yao