Sciweavers

421 search results - page 61 / 85
» Application-Oriented Trust in Distributed Computing
Sort
View
HIPC
2004
Springer
14 years 1 months ago
An Incentive Driven Lookup Protocol for Chord-Based Peer-to-Peer (P2P) Networks
In this paper we describe a novel strategy for carrying out lookups in Chord-based peer-to-peer (P2P) networks, wherein nodes are assumed to behave selfishly. This is in contrast ...
Rohit Gupta, Arun K. Somani
ICALP
2003
Springer
14 years 1 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
FC
2000
Springer
119views Cryptology» more  FC 2000»
14 years 2 days ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
NSPW
2004
ACM
14 years 1 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
CSFW
1992
IEEE
14 years 17 days ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko