Sciweavers

2927 search results - page 211 / 586
» Secure Distributed Human Computation
Sort
View
ICDCS
2008
IEEE
15 years 9 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
112
Voted
CHI
2005
ACM
16 years 3 months ago
Distributed display environments
Augmented reality makes it possible to visualize information directly within the context of the real world by overlaying virtual graphics. We use the term view management to refer...
Dugald Ralph Hutchings, John T. Stasko, Mary Czerw...
114
Voted
CONCURRENCY
2008
124views more  CONCURRENCY 2008»
15 years 2 months ago
A service-oriented Grid environment for integration of distributed kidney models and resources
In this paper, we present a Grid computing platform that provides experimental scientists and analysts with access to computational simulations and knowledge databases hosted in s...
Xingchen Chu, Andrew Lonie, Peter Harris, S. Randa...
227
Voted
ICNP
2002
IEEE
15 years 7 months ago
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
We consider several distributed collaborative key agreement protocols for dynamic peer groups. This problem has several important characteristics which make it different from trad...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau
103
Voted
CCS
2007
ACM
15 years 8 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida