Sciweavers

2904 search results - page 162 / 581
» Internet Infrastructure Security
Sort
View
131
Voted
P2P
2008
IEEE
138views Communications» more  P2P 2008»
15 years 10 months ago
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance
We present a content delivery infrastructure distributing and maintaining software packages in a large organization. Our work based on a trace-based analysis of an existing softwa...
Purvi Shah, Jehan-François Pâris, Jef...
131
Voted
GRID
2008
Springer
15 years 3 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
104
Voted
ICCSA
2005
Springer
15 years 9 months ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez
117
Voted
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
15 years 7 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
131
Voted
WISE
2003
Springer
15 years 9 months ago
Dynamic Virtual Storage Grid for Mobile Web Access
Advancement in wireless infrastructure for data access through third generation wireless and wi-fi technologies makes it possible to use mobile devices for various activities and ...
Harish Kammanahalli, Srividya Gopalan, V. Sridhar