Sciweavers

2951 search results - page 391 / 591
» Secure Distributed DNS
Sort
View
CORR
2008
Springer
181views Education» more  CORR 2008»
15 years 4 months ago
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee
CCR
2007
119views more  CCR 2007»
15 years 4 months ago
An edge-to-edge filtering architecture against DoS
Defending against large, distributed Denial-of-Service attacks is challenging, with large changes to the network core or to end-hosts often suggested. To make matters worse, spooï...
Felipe Huici, Mark Handley
JCP
2006
135views more  JCP 2006»
15 years 4 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
ECCC
2007
185views more  ECCC 2007»
15 years 4 months ago
Trapdoors for Hard Lattices and New Cryptographic Constructions
We show how to construct a variety of “trapdoor†cryptographic tools assuming the worst-case hardness of standard lattice problems (such as approximating the length of the sho...
Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
CLUSTER
2002
IEEE
15 years 4 months ago
Condor-G: A Computation Management Agent for Multi-Institutional Grids
In recent years, there has been a dramatic increase in the amount of available computing and storage resources. Yet few have been able to exploit these resources in an aggregated ...
James Frey, Todd Tannenbaum, Miron Livny, Ian T. F...