Sciweavers

5891 search results - page 183 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
MIDDLEWARE
2004
Springer
15 years 10 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
137
Voted
WS
2003
ACM
15 years 9 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
IACR
2011
133views more  IACR 2011»
14 years 4 months ago
Compact McEliece keys based on Quasi-Dyadic Srivastava codes
The McEliece cryptosystem is one of the few systems to be considered secure against attacks by Quantum computers. The original scheme is built upon Goppa codes and produces very l...
Edoardo Persichetti
CLUSTER
2001
IEEE
15 years 8 months ago
A Class of Loop Self-Scheduling for Heterogeneous Clusters
Distributed Computing Systems are a viable and less expensive alternative to parallel computers. However, a serious difficulty in concurrent programming of a distributed system is...
Anthony T. Chronopoulos, Manuel Benche, Daniel Gro...
147
Voted
EUROSYS
2008
ACM
16 years 1 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...