Sciweavers

2927 search results - page 34 / 586
» Secure Distributed Human Computation
Sort
View
103
Voted
ICPPW
2003
IEEE
15 years 7 months ago
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks
Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, ...
115
Voted
EUROPAR
2008
Springer
15 years 4 months ago
Towards a Security Model to Bridge Internet Desktop Grids and Service Grids
Gabriel Caillat, Oleg Lodygensky, Etienne Urbah, G...
87
Voted
CLOUDCOM
2010
Springer
15 years 17 days ago
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning
Yuri Demchenko, Cees de Laat, Diego R. Lopez, Joan...
122
Voted
SUTC
2008
IEEE
15 years 9 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
118
Voted
SAC
2009
ACM
15 years 9 months ago
On the practical importance of communication complexity for secure multi-party computation protocols
Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...