Sciweavers

374 search results - page 19 / 75
» Towards Secure and Scalable Computation in Peer-to-Peer Netw...
Sort
View
ACISP
2006
Springer
15 years 5 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
83
Voted
CCS
2009
ACM
15 years 6 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
COLCOM
2007
IEEE
15 years 6 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
NETGAMES
2006
ACM
15 years 5 months ago
Towards public server MMOs
While massively multiplayer on-line games (MMOs) are enormously popular, their use of the client-server architecture causes them to suffer from scalability issues and high mainte...
Chris Chambers, Wu-chang Feng, Wu-chi Feng
WICON
2008
15 years 1 months ago
Lightweight management of scalable and personalised media in mobile IPTV networks
In the present paper a novel system for scalable and personalised media management and its architecture is presented. The proposed solution is based on the creation of a secure an...
Laura Arnaiz, Lara García, Federico Alvarez...