Sciweavers

5324 search results - page 893 / 1065
» Internet Security Protocols
Sort
View
CTRSA
2001
Springer
109views Cryptology» more  CTRSA 2001»
14 years 1 months ago
Uncheatable Distributed Computations
Computationally expensive tasks that can be parallelized are most efficiently completed by distributing the computation among a large number of processors. The growth of the Intern...
Philippe Golle, Ilya Mironov
NDSS
1998
IEEE
14 years 1 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
APCHI
2004
IEEE
14 years 29 days ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
CCGRID
2001
IEEE
14 years 26 days ago
While You're Away: A System for Load-Balancing and Resource Sharing Based on Mobile Agents
While You're Away (WYA) is a distributed system that aggregates the computational power of individual computer systems. WYA introduces the notion of Roaming Computations - Ja...
Niranjan Suri, Paul T. Groth, Jeffrey M. Bradshaw
CSE
2009
IEEE
14 years 15 days ago
Socially Enhanced Network Address Translation
—The rapid evolution of the Internet has forced the use of Network Address Translation (NAT) to help slow the decline of publicly available IPv4 address space. While NAT provides...
Alexis Malozemoff, Muthucumaru Maheswaran