Sciweavers

14824 search results - page 2737 / 2965
» Security - Introduction
Sort
View
123
Voted
SIGOPS
2008
156views more  SIGOPS 2008»
15 years 2 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
116
Voted
IJIPT
2007
91views more  IJIPT 2007»
15 years 2 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins
IJISEC
2007
87views more  IJISEC 2007»
15 years 2 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
122
Voted
IJNSEC
2007
194views more  IJNSEC 2007»
15 years 2 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
135
Voted
IJNSEC
2007
157views more  IJNSEC 2007»
15 years 2 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
« Prev « First page 2737 / 2965 Last » Next »