Sciweavers

2139 search results - page 57 / 428
» Distributed computing and computer security education
Sort
View
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
15 years 4 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
CACM
2007
164views more  CACM 2007»
14 years 9 months ago
Is abstraction the key to computing?
ACTION THE KEY TO COMPUTING? Why is it that some software engineers and computer scientists are able to produce clear, elegant designs and programs, while others cannot? Is it poss...
Jeff Kramer
SIGCSE
2009
ACM
168views Education» more  SIGCSE 2009»
15 years 10 months ago
Bringing big systems to small schools: distributed systems for undergraduates
Distributed applications have become a core component of the Internet's infrastructure. However, many undergraduate curriculums, especially at small colleges, do not offer co...
Jeannie R. Albrecht
ICICS
2009
Springer
15 years 4 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
CORR
2008
Springer
181views Education» more  CORR 2008»
14 years 9 months ago
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee