Sciweavers

6137 search results - page 1137 / 1228
» Securing Collaborative Applications
Sort
View
AES
2004
Springer
151views Cryptology» more  AES 2004»
14 years 2 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
ATAL
2004
Springer
14 years 2 months ago
Brain Meets Brawn: Why Grid and Agents Need Each Other
The Grid and agent communities both develop concepts and mechanisms for open distributed systems, albeit from different perspectives. The Grid community has historically focused o...
Ian T. Foster, Nicholas R. Jennings, Carl Kesselma...
EMSOFT
2004
Springer
14 years 2 months ago
Garbage collection for embedded systems
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
David F. Bacon, Perry Cheng, David Grove
GRID
2004
Springer
14 years 2 months ago
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Katarzyna Keahey, Karl Doering, Ian T. Foster
NOSSDAV
2004
Springer
14 years 2 months ago
Low latency and cheat-proof event ordering for peer-to-peer games
We are developing a distributed architecture for massivelymultiplayer games. In this paper, we focus on designing a low-latency event ordering protocol, called NEO, for this archi...
Chris GauthierDickey, Daniel Zappala, Virginia Mar...
« Prev « First page 1137 / 1228 Last » Next »