Sciweavers

680 search results - page 49 / 136
» Locating Hidden Servers
Sort
View
110
Voted
COMPSAC
2002
IEEE
15 years 8 months ago
Designing a Distributed Software Development Support System Using a Peer-to-Peer Architecture
Distributed software development support systems typically use a centralized client-server architecture. This approach has some drawbacks such as the participants may experience l...
Seth Bowen, Frank Maurer
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
15 years 7 months ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan
134
Voted
FMN
2009
Springer
85views Multimedia» more  FMN 2009»
15 years 7 months ago
OASIS Archive - Open Archiving System with Internet Sharing
OASIS Archive project aimed at developing a system for the universal presentation of Media Art works independent of location. The goal was to establish a user-friendly search syste...
Juergen Enge, Andrzej Glowacz, Michal Grega, Mikol...
148
Voted
CMS
2003
120views Communications» more  CMS 2003»
15 years 4 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
131
Voted
IJNSEC
2010
128views more  IJNSEC 2010»
14 years 10 months ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu