Sciweavers

2139 search results - page 46 / 428
» Distributed computing and computer security education
Sort
View
ICDCSW
2007
IEEE
15 years 4 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
ICPP
2007
IEEE
15 years 4 months ago
Designing NFS with RDMA for Security, Performance and Scalability
Ranjit Noronha, Lei Chai, Thomas Talpey, Dhabalesw...
EUROPAR
2008
Springer
14 years 11 months ago
Towards a Security Model to Bridge Internet Desktop Grids and Service Grids
Gabriel Caillat, Oleg Lodygensky, Etienne Urbah, G...