Sciweavers

347 search results - page 13 / 70
» Proactive Computing
Sort
View
ICSE
2009
IEEE-ACM
14 years 4 months ago
Improving the reliability of mobile software systems through continuous analysis and proactive reconfiguration
Most of the current software reliability analysis approaches are geared to traditional desktop software systems, which are relatively stable and static throughout their execution....
Sam Malek, Roshanak Roshandel, David Kilgore, Ibra...
MSWIM
2005
ACM
14 years 3 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 10 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta
ASIACRYPT
2004
Springer
14 years 3 months ago
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)
d abstract) Bartosz Przydatek1 and Reto Strobl2 1 Department of Computer Science, ETH Z¨urich, Switzerland 2 IBM Research, Zurich Research Laboratory, Switzerland In this paper, w...
Bartosz Przydatek, Reto Strobl
SACRYPT
2004
Springer
14 years 3 months ago
On Proactive Secret Sharing Schemes
Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
Ventzislav Nikov, Svetla Nikova