Sciweavers

1255 search results - page 34 / 251
» On Simple and Secure Key Distribution
Sort
View
TEC
2010
173views more  TEC 2010»
14 years 9 months ago
Analysis of Computational Time of Simple Estimation of Distribution Algorithms
Estimation of distribution algorithms (EDAs) are widely used in stochastic optimization. Impressive experimental results have been reported in the literature. However, little work ...
Tianshi Chen, Ke Tang, Guoliang Chen, Xin Yao
FTDCS
1997
IEEE
15 years 6 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
107
Voted
ICDCS
1998
IEEE
15 years 6 months ago
CLIQUES: A New Approach to Group Key Agreement
This paper considers the problem of key agreement in a group setting with highly-dynamic group member population. A protocol suite, called CLIQUES, is developed by extending the w...
Michael Steiner, Gene Tsudik, Michael Waidner
114
Voted
ESCIENCE
2006
IEEE
15 years 8 months ago
Building Simple, Easy-to-Use Grids with Styx Grid Services and SSH
Grid systems have a reputation for being difficult to build and use. We describe how the ease of use of the Styx Grid Services (SGS) software can be combined with the security and...
J. D. Blower, K. Haines
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 2 months ago
A Simple User Authentication Scheme for Grid Computing
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for us...
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui L...