Sciweavers

5891 search results - page 112 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ICB
2007
Springer
104views Biometrics» more  ICB 2007»
15 years 7 months ago
Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection
This paper addresses the biometric template security issue. Follow out previous work on class distribution transform, the proposed scheme selects the distinguish points automatical...
Yi C. Feng, Pong C. Yuen
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 3 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
ICAI
2004
15 years 2 months ago
Task-Oriented Computational Economic-Based Distributed Resource Allocation Mechanisms for Computational Grids
In computational grids, heterogeneous resources with different ownerships are dynamically available and distributed geographically. It is not realistic to build the resource alloc...
Linli He, Thomas R. Ioerger
SPDP
1990
IEEE
15 years 5 months ago
A semi distributed load balancing scheme for large multicomputer systems
In this paper, we propose a semi distributed approach, for load balancing in large parallel and distributedsystems. Theproposedschemeisa twolevel hierarchical scheme which partiti...
Ishfaq Ahmad, Arif Ghafoor
SP
2000
IEEE
112views Security Privacy» more  SP 2000»
15 years 6 months ago
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keyin...
Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric...