Sciweavers

1627 search results - page 267 / 326
» High Security Smartcards
Sort
View
118
Voted
SDMW
2004
Springer
15 years 6 months ago
Experimental Analysis of Privacy-Preserving Statistics Computation
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
15 years 6 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
CCGRID
2003
IEEE
15 years 6 months ago
Recovering Internet Symmetry in Distributed Computing
This paper describes two systems to recover the Internet connectivity impaired by private networks and firewalls. These devices cause asymmetry in the Internet, making peer-to-pee...
Se-Chang Son, Miron Livny
98
Voted
DISCEX
2003
IEEE
15 years 6 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
SISW
2003
IEEE
15 years 6 months ago
Cryptographic File Systems Performance: What You Don't Know Can Hurt You
Securing data is more important than ever, yet cryptographic file systems still have not received wide use. One barrier to the adoption of cryptographic file systems is that the...
Charles P. Wright, Jay Dave, Erez Zadok