Sciweavers

2139 search results - page 42 / 428
» Distributed computing and computer security education
Sort
View
130
Voted
CCGRID
2002
IEEE
15 years 7 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
CSREASAM
2010
15 years 1 days ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
WISEC
2010
ACM
15 years 7 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
149
Voted
COORDINATION
2011
Springer
14 years 6 months ago
Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces
Fan Yang, Tomoyuki Aotani, Hidehiko Masuhara, Flem...
134
Voted
CORR
2008
Springer
102views Education» more  CORR 2008»
15 years 2 months ago
Game Theory with Costly Computation
We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resul...
Joseph Y. Halpern, Rafael Pass