Sciweavers

1656 search results - page 243 / 332
» Secure Computation Without Authentication
Sort
View
VLDB
2007
ACM
119views Database» more  VLDB 2007»
14 years 3 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
ITICSE
2006
ACM
14 years 2 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
IJSN
2006
140views more  IJSN 2006»
13 years 9 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
ECR
2002
160views more  ECR 2002»
13 years 8 months ago
A New Micro-Payment System Using General Payword Chain
In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Therefore, a secure and efficient payment system for general-purpose applic...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
HPDC
2002
IEEE
14 years 1 months ago
Lightweight Self-Organizing Frameworks for Metacomputing
A novel component-based, service-oriented framework for distributed metacomputing is described. Adopting a provider-centric view of resource sharing, this project emphasizes light...
Vaidy S. Sunderam, Dawid Kurzyniec