Sciweavers

5665 search results - page 72 / 1133
» Introduction to Computer Security
Sort
View
ESCIENCE
2006
IEEE
14 years 17 days ago
A Collaborative Virtual Computer Security Lab
The necessity of a lab course on computer security arises from the students' need to complement course work by hands-on experience. In order to meet the distance teaching dem...
Jörg Keller, Ralf Naues
GCA
2009
13 years 6 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
14 years 25 days ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
IMCSIT
2010
13 years 6 months ago
Selected Security Aspects of Agent-based Computing
The paper presents selected security aspects related to confidentiality, privacy, trust and authenticity issues of a distributed, agent-based computing. Particular attention has be...
Mariusz R. Matuszek, Piotr Szpryngier
HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
13 years 19 days ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen