Sciweavers

6907 search results - page 204 / 1382
» Securing distributed adaptation
Sort
View
CCS
2001
ACM
15 years 7 months ago
Formalizing GDOI group key management requirements in NPATRL
Although there is a substantial amount of work on formal requirements for two and three-party key distribution protocols, very little has been done on requirements for group proto...
Catherine Meadows, Paul F. Syverson
129
Voted
EUROCRYPT
2003
Springer
15 years 8 months ago
A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions
Abstract. In this paper we present a simpler construction of a publickey encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapd...
Yehuda Lindell
101
Voted
NGC
2002
Springer
15 years 2 months ago
Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment
The programmable network approach is one possible solution to quickly adapt existing infrastructures to new requirements. This paper shows how programmable networking can be explo...
Lina Alchaal, Vincent Roca, Michel Habert
140
Voted
ISORC
2005
IEEE
15 years 8 months ago
Heterogeneous Adaptive Component-Based Applications with Adaptive.Net
Adaptation to changing environmental conditions is a major challenge for most distributed applications. The service-oriented programming paradigm leads to an increasing number of ...
Andreas Rasche, Marco Puhlmann, Andreas Polze
ADBIS
2005
Springer
140views Database» more  ADBIS 2005»
15 years 8 months ago
D-ARIES: A Distributed Version of the ARIES Recovery Algorithm
Abstract. This paper presents an adaptation of the ARIES recovery algorithm that solves the problem of recovery in Shared Disk (SD) database systems, whilst preserving all the desi...
Jayson Speer, Markus Kirchberg