Sciweavers

2139 search results - page 92 / 428
» Distributed computing and computer security education
Sort
View
114
Voted
WWW
2008
ACM
16 years 3 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 2 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
133
Voted
JCDL
2005
ACM
101views Education» more  JCDL 2005»
15 years 8 months ago
Grid-based digital libraries: cheshire3 and distributed retrieval
The University of California, Berkeley and the University of Liverpool are developing a Information Retrieval and Digital Library system (Cheshire3) that operates in both singlepr...
Ray R. Larson, Robert Sanderson
128
Voted
CORR
2004
Springer
104views Education» more  CORR 2004»
15 years 2 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang
127
Voted
IEEEARES
2008
IEEE
15 years 9 months ago
Privacy-Preserving Distributed Set Intersection
With the growing demand of databases outsourcing and its security concerns, we investigate privacy-preserving set intersection in a distributed scenario. We propose a one-round pr...
Qingsong Ye, Huaxiong Wang, Christophe Tartary