Sciweavers

252 search results - page 11 / 51
» Scalability in a Secure Distributed Proof System
Sort
View
LISA
2007
13 years 10 months ago
Network Patterns in Cfengine and Scalable Data Aggregation
Network patterns are based on generic algorithms that execute on tree-based overlays. A set of such patterns has been developed at KTH to support distributed monitoring in network...
Mark Burgess, Matthew Disney, Rolf Stadler
PODC
2003
ACM
14 years 1 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
ICDCSW
2007
IEEE
14 years 2 months ago
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
1 Challenges of scale have limited the development of event notification systems with strong properties, despite the urgent demand for consistency, reliability, security, and other...
Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrow...
ICS
2010
Tsinghua U.
14 years 5 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
FCS
2006
13 years 9 months ago
Quantum Cryptographic Key Distribution Protocols
The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it i...
Lelde Lace, Oksana Scegulnaja-Dubrovska, Ramuns Us...