Sciweavers

1255 search results - page 141 / 251
» On Simple and Secure Key Distribution
Sort
View
SISW
2003
IEEE
15 years 9 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
124
Voted
EUROPAR
2003
Springer
15 years 9 months ago
Programming Coordinated Motion Patterns with the TOTA Middleware
In this paper, we present TOTA (“Tuples On The Air”), a novel middleware to coordinate the movements of a large number of autonomous components (i.e. agents) in a ubiquitous co...
Marco Mamei, Franco Zambonelli, Letizia Leonardi
PODC
2011
ACM
14 years 6 months ago
Sustaining collaboration in multicast despite rational collusion
This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational...
Haifeng Yu, Phillip B. Gibbons, Chenwei Shi
CCS
2008
ACM
15 years 6 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
ESCIENCE
2006
IEEE
15 years 6 months ago
Domain Based Access Control Model for Distributed Collaborative Applications
This paper describes the design and development of a flexible domain-based access control infrastructure for distributed Collaborative Environments. The paper proposes extensions ...
Yuri Demchenko, Cees de Laat, Leon Gommans, Ren&ea...