Sciweavers

352 search results - page 7 / 71
» Adaptively Secure Multi-Party Computation
Sort
View
SP
2002
IEEE
144views Security Privacy» more  SP 2002»
13 years 6 months ago
ARMS: An agent-based resource management system for grid computing
provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery f...
Junwei Cao, Stephen A. Jarvis, Subhash Saini
ICPADS
2005
IEEE
14 years 18 days ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
CONCUR
2008
Springer
13 years 8 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
IEEESCC
2008
IEEE
14 years 1 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Secured MPEG-21 Digital Item Adaptation for H.264 Video
Seamless adaptation and transcoding techniques to adapt the digital content have achieved significant focus to serve the consumers with the desired content in a feasible way. With...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...