Sciweavers

3299 search results - page 522 / 660
» Privacy and Trusted Computing
Sort
View
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 4 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
CN
2007
172views more  CN 2007»
15 years 4 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CPHYSICS
2007
138views more  CPHYSICS 2007»
15 years 4 months ago
UPIC: A framework for massively parallel particle-in-cell codes
The UCLA Parallel Particle-in-Cell (UPIC) Framework, is designed to provide trusted components for building a variety of parallel Particle-in-Cell (PIC) codes. It is based on the ...
Viktor K. Decyk
MAGS
2006
79views more  MAGS 2006»
15 years 4 months ago
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
In this paper, a novel protocol for providing both client and server anonymity in peer-to-peer (P2P) based grids is presented. The protocol assumes individual nodes or users to be...
Rohit Gupta, Souvik Ray, Arun K. Somani, Zhao Zhan...
IDT
2007
83views more  IDT 2007»
15 years 4 months ago
Negotiating flexible agreements by combining distributive and integrative negotiation
This paper presents an approach to automated negotiation between agents which attempts to combine the advantages of a co-operative value adding approach, with the reality that neg...
Quoc Bao Vo, Lin Padgham, Lawrence Cavedon