Sciweavers

1063 search results - page 66 / 213
» Infrastructure Leasing Problems
Sort
View
MIDDLEWARE
2004
Springer
14 years 2 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...
AINA
2009
IEEE
14 years 1 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
AIWORC
2000
IEEE
14 years 1 months ago
Building Virtual Communities for Research Collaboration
This paper discusses the problem of how to grow and evolve virtual infrastructures that support the development and growth of geographically dispersed research communities. It wil...
Monica M. C. Schraefel, Janet Ho, Mark H. Chignell...
GECCO
1999
Springer
116views Optimization» more  GECCO 1999»
14 years 1 months ago
Dynamic Degree Constrained Network Design: A Genetic Algorithm Approach
The design and development of network infrastructure to support mission-critical operations has become a critical and complicated issue. In this study we explore the use of geneti...
Chao-Hsien Chu, G. Premkumar, Carey Chou, Jianzhon...
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
14 years 20 days ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz