Sciweavers

1785 search results - page 335 / 357
» Modeling Communication with Synchronized Environments
Sort
View
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 3 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
99
Voted
DMSN
2004
ACM
15 years 3 months ago
Adaptive sampling for sensor networks
A distributed data-stream architecture finds application in sensor networks for monitoring environment and activities. In such a network, large numbers of sensors deliver continu...
Ankur Jain, Edward Y. Chang
ICTAI
2003
IEEE
15 years 2 months ago
Deployment and Dynamic Reconfiguration Planning for Distributed Software Systems
Initial deployment and subsequent dynamic reconfiguration of a software system is difficult because of the interplay of many interdependent factors, including cost, time, applicat...
Naveed Arshad, Dennis Heimbigner, Alexander L. Wol...
P2P
2003
IEEE
110views Communications» more  P2P 2003»
15 years 2 months ago
Range Addressable Network: A P2P Cache Architecture for Data Ranges
Peer-to-peer computing paradigm is emerging as a scalable and robust model for sharing media objects. In this paper, we propose an architecture and describe the associated algorit...
Anshul Kothari, Divyakant Agrawal, Abhishek Gupta,...
NORDSEC
2009
Springer
15 years 2 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...