Sciweavers

2282 search results - page 63 / 457
» Distributed Cryptographic Computing on Grid
Sort
View
TDSC
2008
125views more  TDSC 2008»
13 years 10 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
CCS
2007
ACM
14 years 4 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
ICSOC
2003
Springer
14 years 3 months ago
Service-Based Distributed Querying on the Grid
Service-based approaches (such as Web Services and the Open Grid Services Architecture) have gained considerable attention recently for supporting distributed application developme...
M. Nedim Alpdemir, Arijit Mukherjee, Norman W. Pat...
GRID
2007
Springer
13 years 10 months ago
Introduce: An Open Source Toolkit for Rapid Development of Strongly Typed Grid Services
Abstract Service-oriented architectures and applications have gained wide acceptance in the Grid computing community. A number of tools and middleware systems have been developed t...
Shannon Hastings, Scott Oster, Stephen Langella, D...