Sciweavers

421 search results - page 41 / 85
» Application-Oriented Trust in Distributed Computing
Sort
View
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
14 years 5 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...
NDSS
1999
IEEE
14 years 3 months ago
Experimenting with Shared Generation of RSA Keys
We describe an implementation of a distributed algorithm to generate a shared RSA key. At the end of the computation, an RSA modulus N = pq is publicly known. All servers involved...
Michael Malkin, Thomas D. Wu, Dan Boneh
ICPPW
2009
IEEE
14 years 5 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta
MOBISYS
2007
ACM
14 years 10 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
DSOM
2003
Springer
14 years 4 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung