Sciweavers

6907 search results - page 31 / 1382
» Securing distributed adaptation
Sort
View
68
Voted
IEEEARES
2007
IEEE
15 years 4 months ago
Universally Composable Three-Party Key Distribution
—In this paper, we formulate and realize a definition of security for three-party key distribution within the universally composable (UC) framework. That is, an appropriate ideal...
TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang
67
Voted
PDPTA
2003
14 years 11 months ago
Distributed Access Control for Carrier Class Clusters
The telecommunication industry traditionally uses clusters to meet its carrier-class requirements of high availability and reliability. As security has also become a major issue, ...
Makan Pourzandi, Axelle Apvrille, E. Gingras, A. M...
IEEEARES
2006
IEEE
15 years 3 months ago
A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems
Johannes Osrael, Lorenz Froihofer, Karl M. Gö...
AGENTS
2001
Springer
15 years 2 months ago
Distributed sensor network for real time tracking
ÁÒ Ø × Ô Ô Ö Û × Ö ÓÙÖ ×ÓÐÙØ ÓÒ ØÓ Ö Ð¹Ø Ñ ×¹ ØÖ ÙØ Ö ×ÓÙÖ ÐÐÓ Ø ÓÒ ÔÔÐ Ø ÓÒ ÒÚÓÐÚ Ò ×ØÖ ÙØ × ØÙ Ø ÓÒ ×× ××...
Bryan Horling, Régis Vincent, Roger Mailler...
67
Voted
SP
1998
IEEE
114views Security Privacy» more  SP 1998»
15 years 1 months ago
Detecting Disruptive Routers: A Distributed Network Monitoring Approach
Kirk A. Bradley, Steven Cheung, Nicholas J. Puketz...