Sciweavers

162 search results - page 24 / 33
» Outsourcing Multi-Party Computation
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
SIGCSE
2009
ACM
139views Education» more  SIGCSE 2009»
14 years 10 months ago
On preparing students for distributed software development with a synchronous, collaborative development platform
Working remotely is becoming the norm for both professionals and students alike. Software development has become a global industry due to outsourcing, teleworking, flex time, and ...
Andrew Meneely, Laurie Williams
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
14 years 10 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
14 years 11 months ago
Randomized Synopses for Query Assurance on Data Streams
The overwhelming flow of information in many data stream applications forces many companies to outsource to a third-party the deployment of a Data Stream Management System (DSMS) f...
Ke Yi, Feifei Li, Marios Hadjieleftheriou, George ...
ACSC
2007
IEEE
14 years 4 months ago
Web Services Discovery Based On Schema Matching
A web service is programmatically available application logic exposed over Internet. With the rapid development of e-commerce over Internet, web services have attracted much atten...
Yanan Hao, Yanchun Zhang