Sciweavers

5891 search results - page 172 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ACSW
2007
15 years 6 months ago
DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids
Traditional DHT (Distributed Hash Tables) abstraction distributes data items among peer nodes on a structured overlay network. This introduces a number of issues when nodes are un...
Verdi March, Yong Meng Teo, Xianbing Wang
ICCS
2007
Springer
15 years 10 months ago
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Cao Trong Hieu, Choong Seon Hong
MOBIHOC
2005
ACM
16 years 4 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
SIGOPSE
1998
ACM
15 years 8 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
CAI
2002
Springer
15 years 4 months ago
The Computing and Data Grid Approach: Infrastructure for Distributed Science Applications
Grid technology has evolved over the past several years to provide the services and infrastructure needed for building "virtual" systems and organizations. With this Gri...
William E. Johnston