Sciweavers

1988 search results - page 220 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
110
Voted
ICRA
2006
IEEE
128views Robotics» more  ICRA 2006»
15 years 8 months ago
Distributed Construction by Mobile Robots with Enhanced Building Blocks
— We describe a system in which autonomous robots assemble two-dimensional structures out of square building blocks. A fixed set of local control rules is sufficient for a grou...
Justin Werfel, Yaneer Bar-Yam, Daniela Rus, Radhik...
ICEGOV
2007
ACM
15 years 6 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
102
Voted
NSPW
2004
ACM
15 years 8 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
ASIACRYPT
2001
Springer
15 years 7 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
120
Voted
ISPA
2005
Springer
15 years 8 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen