Sciweavers

2139 search results - page 122 / 428
» Distributed computing and computer security education
Sort
View
ICDCIT
2004
Springer
15 years 8 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
HCI
2009
15 years 21 days ago
Distributed Intelligence and Scaffolding in Support of Cognitive Health
Computers have dramatically changed the social landscape and living practices in the 21st century. Most of those changes have empowered typically abled adults, while it is only in ...
Stefan Carmien, Randal A. Koene
123
Voted
CCS
2009
ACM
15 years 7 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
IPPS
2008
IEEE
15 years 9 months ago
Providing security to the Desktop Data Grid
Volunteer Computing is becoming a new paradigm not only for the Computational Grid, but also for institutions using production-level Data Grids because of the enormous storage pot...
Jesus Luna, Michail Flouris, Manolis Marazakis, An...
CCS
2008
ACM
15 years 5 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung