Sciweavers

5891 search results - page 96 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
INFOCOM
2012
IEEE
13 years 3 months ago
VDN: Virtual machine image distribution network for cloud data centers
—Cloud computing centers face the key challenge of provisioning diverse virtual machine instances in an elastic and scalable manner. To address this challenge, we have performed ...
Chunyi Peng, Minkyong Kim, Zhe Zhang, Hui Lei
TCOS
2010
14 years 8 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
FC
1998
Springer
83views Cryptology» more  FC 1998»
15 years 5 months ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
15 years 6 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
ISCAPDCS
2003
15 years 2 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko