Sciweavers

6907 search results - page 31 / 1382
» Securing distributed adaptation
Sort
View
102
Voted
IEEEARES
2007
IEEE
15 years 8 months ago
Universally Composable Three-Party Key Distribution
—In this paper, we formulate and realize a definition of security for three-party key distribution within the universally composable (UC) framework. That is, an appropriate ideal...
TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang
102
Voted
PDPTA
2003
15 years 3 months ago
Distributed Access Control for Carrier Class Clusters
The telecommunication industry traditionally uses clusters to meet its carrier-class requirements of high availability and reliability. As security has also become a major issue, ...
Makan Pourzandi, Axelle Apvrille, E. Gingras, A. M...
89
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems
Johannes Osrael, Lorenz Froihofer, Karl M. Gö...
AGENTS
2001
Springer
15 years 7 months ago
Distributed sensor network for real time tracking
ÁÒ Ø × Ô Ô Ö Û × Ö ÓÙÖ ×ÓÐÙØ ÓÒ ØÓ Ö Ð¹Ø Ñ ×¹ ØÖ ÙØ Ö ×ÓÙÖ ÐÐÓ Ø ÓÒ ÔÔÐ Ø ÓÒ ÒÚÓÐÚ Ò ×ØÖ ÙØ × ØÙ Ø ÓÒ ×× ××...
Bryan Horling, Régis Vincent, Roger Mailler...
96
Voted
SP
1998
IEEE
114views Security Privacy» more  SP 1998»
15 years 6 months ago
Detecting Disruptive Routers: A Distributed Network Monitoring Approach
Kirk A. Bradley, Steven Cheung, Nicholas J. Puketz...