Sciweavers

1135 search results - page 129 / 227
» On Performance of Delegation in Java
Sort
View
ICDCS
2011
IEEE
14 years 3 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
15 years 10 months ago
Frameworks for Securing Limited-Device Applications
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks...
Timothy E. Lindquist, Aarthi Ramamurthy, Ramon Ang...
EDOC
2003
IEEE
15 years 9 months ago
An Efficient, Scalable Content-Based Messaging System
Large-scale information processing environments must rapidly search through massive streams of raw data to locate useful information. These data streams contain textual and numeri...
Ian Gorton, Justin Almquist, Nick Cramer, Jereme H...
IADIS
2004
15 years 5 months ago
Enhancing WLAN Security by Introducing EAP-TLS Smartcards
Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...
Mohamad Badra, Pascal Urien
COORDINATION
2010
Springer
15 years 2 months ago
Efficient Session Type Guided Distributed Interaction
Abstract. Recently, there has been much interest in multi-party session types (MPSTs) as a means of rigorously specifying protocols for interaction among multiple distributed parti...
K. C. Sivaramakrishnan, Karthik Nagaraj, Lukasz Zi...