Sciweavers

2951 search results - page 126 / 591
» Secure Distributed DNS
Sort
View
GSEM
2004
Springer
15 years 8 months ago
Enhancing Java Grid Computing Security with Resource Control
Abstract. This paper outlines an original Computational Grid deployment protocol which is entirely based on Java, leveraging the portability of this language for distributing custo...
Jarle Hulaas, Walter Binder, Giovanna Di Marzo Ser...
131
Voted
ECOOPW
1999
Springer
15 years 6 months ago
Security Properties of Typed Applets
This paper formalizes the folklore result that strongly-typed applets are more secure than untyped ones. We formulate and prove several security properties that all well-typed app...
Xavier Leroy, François Rouaix
CORR
2008
Springer
72views Education» more  CORR 2008»
15 years 2 months ago
Lossless Compression with Security Constraints
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are availab...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
119
Voted
AINA
2009
IEEE
15 years 7 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
139
Voted
PDCAT
2007
Springer
15 years 8 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen