Sciweavers

2139 search results - page 46 / 428
» Distributed computing and computer security education
Sort
View
ICDCSW
2007
IEEE
15 years 6 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
ICPP
2007
IEEE
15 years 6 months ago
Designing NFS with RDMA for Security, Performance and Scalability
Ranjit Noronha, Lei Chai, Thomas Talpey, Dhabalesw...