Sciweavers

2139 search results - page 91 / 428
» Distributed computing and computer security education
Sort
View
118
Voted
ICALP
2004
Springer
15 years 8 months ago
Group Spreading: A Protocol for Provably Secure Distributed Name Service
In order to enable communication between a dynamic collection of peers with given ID’s, such as “machine.cs.school.edu”, over the Internet, a distributed name service must b...
Baruch Awerbuch, Christian Scheideler
115
Voted
PERCOM
2008
ACM
16 years 2 months ago
P2PNS: A Secure Distributed Name Service for P2PSIP
Decentralized Voice over IP networks are a promising alternative to classical server-based SIP networks especially in disaster areas or areas without centralized infrastructure. T...
Ingmar Baumgart
SIGITE
2004
ACM
15 years 8 months ago
How information technology professionals keep from being outsourced or offshored
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
Ron Fulbright, Richard L. Routh
142
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 2 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
MDM
2007
Springer
111views Communications» more  MDM 2007»
15 years 8 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich