Sciweavers

905 search results - page 102 / 181
» Public key distribution through
Sort
View
CCGRID
2003
IEEE
14 years 2 months ago
Programming for Dependability in a Service-based Grid
Service-based Grid infrastructures emphasize service composition rather than sharing of low level resources. The idea is to build Grid applications out of computational services p...
Win Bausch, Cesare Pautasso, Gustavo Alonso
VLDB
2001
ACM
110views Database» more  VLDB 2001»
14 years 1 months ago
Comparing Hybrid Peer-to-Peer Systems
“Peer-to-peer” systems like Napster and Gnutella have recently become popular for sharing information. In this paper, we study the relevant issues and tradeoffs in designing a...
Beverly Yang, Hector Garcia-Molina
CSREASAM
2008
13 years 10 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
ISCAPDCS
2003
13 years 10 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
BIB
2008
106views more  BIB 2008»
13 years 9 months ago
Biodiversity informatics: the challenge of linking data and the role of shared identifiers
A major challenge facing biodiversity informatics is integrating data stored in widely distributed databases. Initial efforts have relied on taxonomic names as the shared identifi...
Roderic D. M. Page