Sciweavers

2282 search results - page 390 / 457
» Distributed Cryptographic Computing on Grid
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 3 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
P2P
2008
IEEE
222views Communications» more  P2P 2008»
14 years 4 months ago
IgorFs: A Distributed P2P File System
IgorFs is a distributed, decentralized peer-to-peer (P2P) file system that is completely transparent to the user. It is built on top of the Igor peer-to-peer overlay network, whi...
Bernhard Amann, Benedikt Elser, Yaser Houri, Thoma...
FOCS
2007
IEEE
14 years 4 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
PDP
2008
IEEE
14 years 4 months ago
Automatic Service Deployment Using Virtualisation
Manual deployment of the application usually requires expertise both about the underlying system and the application. Automatic service deployment can improve deployment significa...
Gabor Kecskemeti, Péter Kacsuk, Gábo...
IPPS
2007
IEEE
14 years 4 months ago
Java and asynchronous iterative applications: large scale experiments
This paper focuses on large scale experiments with Java and asynchronous iterative applications. In those applications, tasks are dependent and the use of distant clusters may be ...
Jacques M. Bahi, Raphaël Couturier, David Lai...