Sciweavers

2139 search results - page 75 / 428
» Distributed computing and computer security education
Sort
View
CORR
2008
Springer
73views Education» more  CORR 2008»
14 years 12 months ago
Regularities of the distribution of abstract van der Corput sequences
TIES OF THE DISTRIBUTION OF ABSTRACT VAN DER CORPUT SEQUENCES WOLFGANG STEINER Abstract. Similarly to -adic van der Corput sequences, abstract van der Corput secan be defined by ab...
Wolfgang Steiner
CORR
2010
Springer
80views Education» more  CORR 2010»
14 years 6 months ago
Distributed Deterministic Edge Coloring using Bounded Neighborhood Independence
We study the edge-coloring problem in the message-passing model of distributed computing. This is one of the most fundamental problems in this area. Currently, the best-known dete...
Leonid Barenboim, Michael Elkin
WPES
2003
ACM
15 years 5 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...
ACSAC
2006
IEEE
15 years 6 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
CORR
2006
Springer
146views Education» more  CORR 2006»
14 years 12 months ago
Oblivious-Transfer Amplification
Abstract. Oblivious transfer (OT) is a primitive of paramount importance in cryptography or, more precisely, two- and multi-party computation due to its universality. Unfortunately...
Jürg Wullschleger