Sciweavers

1834 search results - page 322 / 367
» Public Key Cryptography
Sort
View
COMCOM
2008
138views more  COMCOM 2008»
13 years 7 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...

Publication
116views
13 years 7 months ago
Poking Facebook: Characterization of OSN Applications
Facebook is one of the most popular Internet sites today. A key fea- ture that arguably contributed to Facebook's unprecedented success is its application platform, which enab...
Minas Gjoka, Michael Sirivianos, Athina Markopoulo...
DM
2010
132views more  DM 2010»
13 years 7 months ago
Diameter and connectivity of 3-arc graphs
An arc of a graph is an oriented edge and a 3-arc is a 4-tuple (v, u, x, y) of vertices such that both (v, u, x) and (u, x, y) are paths of length two. The 3-arc graph of a given ...
Martin Knor, Sanming Zhou
GRID
2006
Springer
13 years 7 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
JDCTA
2008
83views more  JDCTA 2008»
13 years 7 months ago
Translation from GDMO/ASN.1 to tML/Schema
For interoperation of heterogeneous management systems and integration of existing legacy applications in telecommunication network management systems, a translation from GDMO/ASN...
Wenli Dong