Sciweavers

450 search results - page 64 / 90
» Research on Security Architecture and Protocols of Grid Comp...
Sort
View
ESCIENCE
2006
IEEE
14 years 5 months ago
Practical Fault-Tolerant Framework for eScience Infrastructure
Many areas of science currently use computing resources as a important part of their research, and many research groups adopt cluster architecture to use them efficiently and mana...
Hyuck Han, Jai Wug Kim, Jongpil Lee, Youngjin Yu, ...
IDTRUST
2009
ACM
14 years 5 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
CCS
2009
ACM
14 years 5 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
ICDCIT
2005
Springer
14 years 4 months ago
Off-Line Micro-payment System for Content Sharing in P2P Networks
— Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-asyou-use services for a wide variety of web-based applications. We proposed a n...
Xiaoling Dai, John C. Grundy
AINA
2006
IEEE
14 years 5 months ago
Simulation Architecture for Data Processing Algorithms in Wireless Sensor Networks
Abstract— Wireless sensor networks, by providing an unprecedented way of interacting with the physical environment, have become a hot topic for research over the last few years. ...
Yann-Aël Le Borgne, Mehdi Moussaid, Gianluca ...