Sciweavers

1988 search results - page 32 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
JUCS
2008
156views more  JUCS 2008»
14 years 9 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
SIGGRAPH
1991
ACM
15 years 1 months ago
A global illumination solution for general reflectance distributions
A general light transfer simulation algorithm for environments composed of materials with arbitrary reflectance functions is presented. This algorithm removes the previous practic...
François X. Sillion, James Arvo, Stephen H....
CBMS
2008
IEEE
15 years 4 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
FTDCS
2003
IEEE
15 years 3 months ago
Secure Middleware for Situation-Aware Naval C2 and Combat Systems
There is an increasing need within the Navy and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and survivable in the face of att...
Ramesh Bharadwaj
SISW
2005
IEEE
15 years 3 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...