Sciweavers

421 search results - page 54 / 85
» Application-Oriented Trust in Distributed Computing
Sort
View
ASIACRYPT
2001
Springer
14 years 1 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
ICDCS
2009
IEEE
14 years 5 months ago
CAP: A Context-Aware Privacy Protection System for Location-Based Services
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses ...
Aniket Pingley, Wei Yu, Nan Zhang 0004, Xinwen Fu,...
TARK
2005
Springer
14 years 2 months ago
Unconditional privacy in social choice
The aggregation of conflicting preferences is an important issue in human society and multiagent systems. Due to its universality, voting among a set of alternatives has a centra...
Felix Brandt, Tuomas Sandholm
ACSW
2006
13 years 10 months ago
Improving resource utilisation in market oriented grid management and scheduling
Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisatio...
Kris Bubendorfer
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...