Sciweavers

1381 search results - page 266 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
CORR
2004
Springer
142views Education» more  CORR 2004»
14 years 10 months ago
Global Grids and Software Toolkits: A Study of Four Grid Middleware Technologies
: Grid is an infrastructure that involves the integrated and collaborative use of computers, networks, databases and scientific instruments owned and managed by multiple organizati...
Parvin Asadzadeh, Rajkumar Buyya, Chun Ling Kei, D...
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
14 years 8 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
HPDC
1996
IEEE
15 years 2 months ago
Legion - A View from 50, 000 Feet
' The coming of giga-bit networks makes possible the realization ofa single nationwide virtual computer comprised of a variety of geographically distributed highpe6ormance mac...
Andrew S. Grimshaw, William A. Wulf
ICNP
2002
IEEE
15 years 3 months ago
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
We consider several distributed collaborative key agreement protocols for dynamic peer groups. This problem has several important characteristics which make it different from trad...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau
EUROSYS
2008
ACM
15 years 7 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos