Sciweavers

2057 search results - page 104 / 412
» Distributed Secure Systems: Then and Now
Sort
View
130
Voted
RT
2004
Springer
15 years 9 months ago
Realtime Caustics using Distributed Photon Mapping
With the advancements in realtime ray tracing and new global illumination algorithms we are now able to render the most important illumination effects at interactive rates. One of...
Johannes Günther, Ingo Wald, Philipp Slusalle...
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 5 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
FI
2011
96views more  FI 2011»
14 years 11 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
14 years 11 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
144
Voted
EUROPAR
2009
Springer
15 years 8 months ago
Surfing Peer-to-Peer IPTV: Distributed Channel Switching
It is now common for IPTV systems attracting millions of users to be based on a peer-to-peer (P2P) architecture. In such systems, each channel is typically associated with one P2P ...
Anne-Marie Kermarrec, Erwan Le Merrer, Yaning Liu,...