Sciweavers

1255 search results - page 120 / 251
» On Simple and Secure Key Distribution
Sort
View
EUROPAR
2006
Springer
15 years 7 months ago
Private Virtual Cluster: Infrastructure and Protocol for Instant Grids
Given current complexity of Grid technologies, the lack of security of P2P systems and the rigidity of VPN technologies make sharing resources belonging to different institutions s...
Ala Rezmerita, Tangui Morlier, Vincent Néri...
154
Voted
AICT
2006
IEEE
102views Communications» more  AICT 2006»
15 years 5 months ago
Publishing, Retrieving and Streaming Lectures via Application Level Multicast
Structured peer-to-peer overlay network is an efficient solution for querying and retrieving resources spread between the peers. Unfortunately, key based routing of Distributed Ha...
Marco Milanesio, Giancarlo Ruffo
140
Voted
CCS
2007
ACM
15 years 10 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
134
Voted
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 9 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
135
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du