Sciweavers

6164 search results - page 1123 / 1233
» Teaching Computer Security
Sort
View
P2P
2007
IEEE
110views Communications» more  P2P 2007»
15 years 9 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 9 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 9 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
AISADM
2007
Springer
15 years 9 months ago
Robust Agent Communities
We believe that intelligent information agents will represent their users interest in electronic marketplaces and other forums to trade, exchange, share, identify, and locate goods...
Sandip Sen, Sabyasachi Saha, Stéphane Airia...
ATAL
2007
Springer
15 years 9 months ago
SSDPOP: improving the privacy of DCOP with secret sharing
Multi-agent systems designed to work collaboratively with groups of people typically require private information that people will entrust to them only if they have assurance that ...
Rachel Greenstadt, Barbara J. Grosz, Michael D. Sm...
« Prev « First page 1123 / 1233 Last » Next »