Sciweavers

26 search results - page 3 / 6
» Providing data confidentiality against malicious hosts in Sh...
Sort
View
ICICS
2003
Springer
15 years 2 months ago
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
Abstract. For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing ...
Yan Wang 0002, Chi-Hung Chi, Tieyan Li
EUROCRYPT
2006
Springer
15 years 1 months ago
Our Data, Ourselves: Privacy Via Distributed Noise Generation
In this work we provide efficient distributed protocols for generating shares of random noise, secure against malicious participants. The purpose of the noise generation is to crea...
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSher...
91
Voted
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
15 years 3 months ago
On the Development of an Internetwork-Centric Defense for Scanning Worms
Studies of worm outbreaks have found that the speed of worm propagation makes manual intervention ineffective. Consequently, many automated containment mechanisms have been propos...
Scott E. Coull, Boleslaw K. Szymanski
USS
2008
14 years 11 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
IFIP8
2007
14 years 11 months ago
Grid-VirtuE: A Layered Architecture for Grid Virtual Enterprises
A grid virtual enterprise is a community of independent enterprises concerned with a particular sector of the economy. Its members (nodes) are small or medium size enterprises (SME...
Alfredo Cuzzocrea, Alessandro D'Atri, Andrea Gualt...