Sciweavers

2139 search results - page 159 / 428
» Distributed computing and computer security education
Sort
View
IPPS
2007
IEEE
15 years 9 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 7 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 9 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
15 years 2 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
CORR
2010
Springer
130views Education» more  CORR 2010»
15 years 3 months ago
Sharp Bounds on the Entropy of the Poisson Law and Related Quantities
One of the difficulties in calculating the capacity of certain Poisson channels is that H(), the entropy of the Poisson distribution with mean , is not available in a simple form. ...
José A. Adell, Alberto Lekuona, Yaming Yu