Sciweavers

2139 search results - page 90 / 428
» Distributed computing and computer security education
Sort
View
77
Voted
EDOC
2006
IEEE
15 years 8 months ago
An Ontology-based Approach to the Formalization of Information Security Policies
Fernando Náufel do Amaral, Carlos Baz&iacut...
125
Voted
EUROCRYPT
1999
Springer
15 years 7 months ago
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private key...
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk,...
150
Voted
JCM
2008
73views more  JCM 2008»
15 years 2 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou
165
Voted
SEC
2007
15 years 4 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
125
Voted
ADHOCNOW
2008
Springer
15 years 9 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli