Sciweavers

340 search results - page 31 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
PET
2004
Springer
14 years 1 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
ICPP
2009
IEEE
14 years 2 months ago
A Strategy-proof Pricing Scheme for Multiple Resource Type Allocations
Abstract—Resource sharing on the Internet is becoming increasingly pervasive. Recently, there is growing interest in distributed systems such as peer-to-peer and grid, with effor...
Yong Meng Teo, Marian Mihailescu
CSREASAM
2006
13 years 9 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
ICDCSW
2008
IEEE
14 years 2 months ago
Towards Cyber-Physical Holodeck Systems Via Physically Rendered Environments (PRE's)
We present an early vision of a cyber-physical environment in which computer controlled rendering of physical surfaces, terrains, and environments is achieved by manipulating grid...
Veljko Krunic, Richard Han
CCS
2010
ACM
14 years 2 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...