Sciweavers

2139 search results - page 199 / 428
» Distributed computing and computer security education
Sort
View
146
Voted
IMC
2010
ACM
15 years 1 months ago
Measuring the mixing time of social graphs
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim
IPPS
2003
IEEE
15 years 8 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
142
Voted
CCS
2010
ACM
15 years 3 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim
IDTRUST
2010
ACM
15 years 8 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
136
Voted
SERP
2003
15 years 4 months ago
A Portable and Collaborative Distributed Programming Environment
Due to recent advances in network and computing facilities, use of the Internet is becoming popular and promising in various areas such as scientific collaboration, information di...
Chang-Hyun Jo, Allen J. Arnold