Sciweavers

2951 search results - page 343 / 591
» Secure Distributed DNS
Sort
View
CSI
2007
91views more  CSI 2007»
15 years 5 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
KAIS
2008
99views more  KAIS 2008»
15 years 5 months ago
Privacy-preserving SVM classification
Classical data mining algorithms implicitly assume complete access to all data, either in centralized or federated form. However, privacy and security concerns often prevent sharin...
Jaideep Vaidya, Hwanjo Yu, Xiaoqian Jiang
CCR
2007
168views more  CCR 2007»
15 years 4 months ago
Challenges in peer-to-peer gaming
While multi-player online games are very successful, their fast deployment suffers from their server-based architecture. Indeed, servers both limit the scalability of the games a...
Christoph Neumann, Nicolas Prigent, Matteo Varvell...
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
15 years 4 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
WAIM
2010
Springer
15 years 3 months ago
Trustworthy Information: Concepts and Mechanisms
We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging...
Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin ...