Sciweavers

2927 search results - page 157 / 586
» Secure Distributed Human Computation
Sort
View
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 9 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
COLCOM
2005
IEEE
14 years 3 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
IPPS
2006
IEEE
14 years 3 months ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang
SACMAT
2004
ACM
14 years 3 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
CHI
2004
ACM
14 years 10 months ago
A social proxy for distributed tasks: design and evaluation of a working prototype
This paper describes an approach to managing tasks and processes that are distributed across a large number of people. The basic idea is to use a social visualization called a tas...
Thomas Erickson, Wei Huang, Catalina Danis, Wendy ...