Sciweavers

2108 search results - page 276 / 422
» Encrypted
Sort
View
ISCIS
2003
Springer
15 years 9 months ago
Design and Implementation of a Secure Group Communication Protocol on a Fault Tolerant Ring
In this paper, we describe a secure group communication protocol for a fault-tolerant synchronous ring. Our protocol, named Secure Synchronous Ring Protocol (SSRP), integrates a se...
Özgür Saglam, Mehmet E. Dalkilç, ...
CCGRID
2002
IEEE
15 years 9 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
142
Voted
FCCM
2002
IEEE
208views VLSI» more  FCCM 2002»
15 years 9 months ago
The Effects of Datapath Placement and C-Slow Retiming on Three Computational Benchmarks
C-slow retiming (changing a design to support multiple instances of a computation) and datapath-aware placement have long been advocated by members of the FPGA synthesis community...
Nicholas Weaver, John Wawrzynek
ITCC
2002
IEEE
15 years 9 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
COCOON
2010
Springer
15 years 9 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...