Sciweavers

2139 search results - page 46 / 428
» Distributed computing and computer security education
Sort
View
123
Voted
ICDCSW
2007
IEEE
15 years 9 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
85
Voted
ICPP
2007
IEEE
15 years 9 months ago
Designing NFS with RDMA for Security, Performance and Scalability
Ranjit Noronha, Lei Chai, Thomas Talpey, Dhabalesw...
104
Voted
ICPPW
2003
IEEE
15 years 8 months ago
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks
Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, ...
119
Voted
EUROPAR
2008
Springer
15 years 4 months ago
Towards a Security Model to Bridge Internet Desktop Grids and Service Grids
Gabriel Caillat, Oleg Lodygensky, Etienne Urbah, G...
87
Voted
CLOUDCOM
2010
Springer
15 years 22 days ago
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning
Yuri Demchenko, Cees de Laat, Diego R. Lopez, Joan...