Sciweavers

374 search results - page 46 / 75
» Towards Secure and Scalable Computation in Peer-to-Peer Netw...
Sort
View
IPPS
2009
IEEE
15 years 6 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
SIGMOD
2001
ACM
135views Database» more  SIGMOD 2001»
15 years 12 months ago
The Network is the Database: Data Management for Highly Distributed Systems
This paper describes the methodology and implementation of a data management system for highly distributed systems, which was built to solve the scalability and reliability proble...
Julio C. Navas, Michael J. Wynblatt
NDSS
1997
IEEE
15 years 4 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
DSN
2009
IEEE
15 years 6 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
IPPS
2006
IEEE
15 years 5 months ago
Towards MPI progression layer elimination with TCP and SCTP
MPI middleware glues together the components necessary for execution. Almost all implementations have a communication component also called a message progression layer that progre...
Brad Penoff, Alan Wagner