Sciweavers

2601 search results - page 397 / 521
» Secure Rewarding Schemes
Sort
View
HPDC
2005
IEEE
15 years 8 months ago
The resource oriented authorization manager (ROAM)
The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible authorization system for the National Fusion Grid (FusionGrid). This system builds ...
Justin Burruss
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
15 years 8 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
ICICS
2005
Springer
15 years 8 months ago
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails
Efficiently protecting the privacy of multi-recipient emails is not as trivial as it seems. The approach proposed by S/MIME is to concatenate all ciphertexts. However, it suffers ...
Wei Wei, Xuhua Ding, Kefei Chen
CRYPTO
2004
Springer
139views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
How to Compress Rabin Ciphertexts and Signatures (and More)
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
Craig Gentry
ECAI
2004
Springer
15 years 8 months ago
Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining
Spontaneous formation of peer-to-peer agent-based data mining systems seems a plausible scenario in years to come. However, the emergence of peer-to-peer environments further exace...
Josenildo Costa da Silva, Matthias Klusch, Stefano...