Sciweavers

2057 search results - page 86 / 412
» Distributed Secure Systems: Then and Now
Sort
View
124
Voted
ACSAC
2006
IEEE
15 years 10 months ago
An Internet Voting System Supporting User Privacy
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
Aggelos Kiayias, Michael Korman, David Walluck
HOTOS
2009
IEEE
15 years 8 months ago
Security Impact Ratings Considered Harmful
In this paper, we question the common practice of assigning security impact ratings to OS updates. Specifically, we present evidence that ranking updates by their perceived securi...
Jeff Arnold, Tim Abbott, Waseem Daher, Gregory Pri...
ICPADS
2005
IEEE
15 years 9 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
HPDC
1999
IEEE
15 years 8 months ago
The UNICORE Architecture Seamless Access to Distributed Resources
Seamless access to different systems of different vendors at different sites is an important prerequisite to effective and efficient use of distributed resources. Learning about n...
Mathilde Romberg
ICPADS
2008
IEEE
15 years 10 months ago
The Organization of Intel Cup Undergraduate Embedded System Electronic Design Contest
The Intel Cup Undergraduate Embedded System Electronic Design Contest is an embedded system design invitational contest in China. This contest is held every two years since 2002. ...
Tianzhou Chen, Jolly Wang, Bin Xie, Guozhi Xu