Sciweavers

84 search results - page 15 / 17
» On Secure Distributed Data Storage Under Repair Dynamics
Sort
View
SC
2004
ACM
14 years 1 months ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
COMSUR
2011
221views Hardware» more  COMSUR 2011»
12 years 7 months ago
Computational Intelligence in Wireless Sensor Networks: A Survey
—Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many chall...
Raghavendra V. Kulkarni, A. Forster, Ganesh K. Ven...
ATAL
2007
Springer
14 years 1 months ago
An agent-based approach for privacy-preserving recommender systems
Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an ess...
Richard Cissée, Sahin Albayrak
ICDCSW
2005
IEEE
14 years 1 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
13 years 11 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor