Sciweavers

2927 search results - page 49 / 586
» Secure Distributed Human Computation
Sort
View
GRID
2004
Springer
14 years 1 months ago
Performance Comparison of Security Mechanisms for Grid Services
Security is one of the most important features for Grid services. There are several specifications used to add security to Grid services, and some of them have been implemented a...
Satoshi Shirasuna, Aleksander Slominski, Liang Fan...
FGCN
2008
IEEE
200views Communications» more  FGCN 2008»
14 years 2 months ago
Fast Method for Multiple Human Face Segmentation in Color Image
Face segmentation has been used in many different applications, such as face tracking, video surveillance in security control system and human computer interface. In this paper we...
Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald...
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
WIMOB
2007
IEEE
14 years 2 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
ICPADS
1997
IEEE
14 years 3 days ago
An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions
Mobile agents are no longer a theoretical issue since different architectures for their realization have been proposed. With the increasing market of electronic commerce it become...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...