Sciweavers

2057 search results - page 12 / 412
» Distributed Secure Systems: Then and Now
Sort
View
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
14 years 10 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
ICIP
1998
IEEE
14 years 11 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
ICDCSW
2007
IEEE
14 years 4 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
ISSADS
2005
Springer
14 years 3 months ago
Security Challenges of Distributed e-Learning Systems
Roberto Gómez Cárdenas, Erika Mata S...