Sciweavers

2927 search results - page 23 / 586
» Secure Distributed Human Computation
Sort
View
PDCAT
2005
Springer
14 years 1 months ago
A Scalable Security Architecture for Grid
Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong
PODC
2010
ACM
13 years 11 months ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer
IPPS
2007
IEEE
14 years 2 months ago
A Global Security Architecture for Intrusion Detection on Computer Networks
— Detecting all kinds of intrusions efficiently requires a global view of the monitored network. Built to increase the security of computer networks, traditional IDS are unfortu...
Abdoul Karim Ganame, Julien Bourgeois, Renaud Bido...
ICRA
2010
IEEE
193views Robotics» more  ICRA 2010»
13 years 6 months ago
Model-based motion tracking system using distributed network cameras
— For a coexisting and collaborative society that incorporates humans and robots, the detection, tracking, and recognition of human motion are indispensable techniques for a robo...
Yumi Iwashita, Ryo Kurazume, Takamitsu Mori, Masak...
ICDCSW
2007
IEEE
14 years 2 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato