Sciweavers

5891 search results - page 175 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
CCGRID
2006
IEEE
15 years 10 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...
ICDCSW
2005
IEEE
15 years 10 months ago
Measurement-Based Peer-to-Peer Grouping for Networked Virtual Environment
Networked games are newly emerging and increasing applications in the Internet community. Multiplayer Online Game (MOG) is one of such applications that can accommodate many users...
Hajime Sogawa, Niwat Thepvilojanapong, Hiroki Sait...
DAM
2006
121views more  DAM 2006»
15 years 4 months ago
Fine-grained forward-secure signature schemes without random oracles
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-...
Jan Camenisch, Maciej Koprowski
ACSAC
2000
IEEE
15 years 9 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
PODC
2011
ACM
14 years 7 months ago
Sustaining collaboration in multicast despite rational collusion
This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational...
Haifeng Yu, Phillip B. Gibbons, Chenwei Shi