Sciweavers

8493 search results - page 1519 / 1699
» Implementing a distributed firewall
Sort
View
EUROCRYPT
2008
Springer
15 years 5 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
ADBIS
2010
Springer
154views Database» more  ADBIS 2010»
15 years 5 months ago
Platform Independent Database Replication Solution Applied to Medical Information System
Medical Information Systems (MIS) in general, like any other complex and large system, can be based on centralized or distributed DBMS. Centralized system is much easier for implem...
Tatjana Stankovic, Srebrenko Pesic, Dragan Jankovi...
CATE
2004
128views Education» more  CATE 2004»
15 years 5 months ago
A Service-oriented Approach for Pervasive Learning Grid
This investigation proposed a service-oriented approach based on a pervasive learning grid for solving the difficulties associated with sharing learning resources distributed on d...
Ching-Jung Liao, Fan-Chuan Yang
131
Voted
FLAIRS
2004
15 years 5 months ago
The Mobile Agents Integrated Field Test
The Mobile Agents model-based, distributed architecture, which integrates diverse components in a system for lunar and planetary surface operations, was extensively tested in a tw...
William J. Clancey, Maarten Sierhuis, Rich Alena, ...
CMS
2003
171views Communications» more  CMS 2003»
15 years 5 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
« Prev « First page 1519 / 1699 Last » Next »