Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
Replication is a commonly proposed solution to problems of scale associated with distributed services. However, when a service is replicated, each client must be assigned a server...
Grid computing is a new paradigm that enables the distributed coordination of resources and services which are geographically dispersed, span multiple trust domains and are hetero...
Sergio Andreozzi, Augusto Ciuffoletti, Antonia Ghi...
Abstract— Despite the emergence of voice over IP and videoconferencing services, recent studies have shown that the Internet still may not provide acceptable quality for interact...
Fernando Silveira Filho, Edson H. Watanabe, Edmund...