Sciweavers

2282 search results - page 344 / 457
» Distributed Cryptographic Computing on Grid
Sort
View
115
Voted
CONCUR
2005
Springer
15 years 8 months ago
Selecting Theories and Recursive Protocols
Many decidability results are known for non-recursive cryptographic protocols, where the protocol steps can be expressed by simple rewriting rules. Recently, a tree transducer-base...
Tomasz Truderung
111
Voted
FC
2003
Springer
101views Cryptology» more  FC 2003»
15 years 7 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
112
Voted
ICITS
2009
15 years 9 days ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka
ATAL
2008
Springer
15 years 4 months ago
On the importance of migration for fairness in online grid markets
Computational grids offer users a simple access to tremendous computer resources for solving large scale computing problems. Traditional performance analysis of scheduling algorit...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
164
Voted
SIGMOD
2007
ACM
106views Database» more  SIGMOD 2007»
16 years 2 months ago
Highly distributed XQuery with DXQ
Many modern applications, from Grid computing to RSS handling, need to support data processing in a distributed environment. Currently, most such applications are implemented usin...
Jérôme Siméon, Kristi Morton, ...