Sciweavers

2904 search results - page 193 / 581
» Internet Infrastructure Security
Sort
View
FC
2003
Springer
104views Cryptology» more  FC 2003»
15 years 9 months ago
On the Economics of Anonymity
Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives t...
Alessandro Acquisti, Roger Dingledine, Paul F. Syv...
HPDC
2002
IEEE
15 years 8 months ago
Lightweight Self-Organizing Frameworks for Metacomputing
A novel component-based, service-oriented framework for distributed metacomputing is described. Adopting a provider-centric view of resource sharing, this project emphasizes light...
Vaidy S. Sunderam, Dawid Kurzyniec
AGENTS
2000
Springer
15 years 8 months ago
Scalability Metrics and Analysis of Mobile Agent Systems
Scalability is a many-sided property which can be captured in a scalability metric that balances cost, volume, timeliness and other attirbutes of value in the system, as a functio...
C. Murray Woodside
CCS
2008
ACM
15 years 5 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
CMS
2003
120views Communications» more  CMS 2003»
15 years 5 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...