Sciweavers

4111 search results - page 112 / 823
» Security, Protocols, and Trust
Sort
View
ICC
2007
IEEE
105views Communications» more  ICC 2007»
14 years 4 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang
ACSAC
2004
IEEE
14 years 1 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
TCSV
2008
298views more  TCSV 2008»
13 years 10 months ago
TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming
Abstract--To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues o...
Hao Yin, Chuang Lin, Qian Zhang, Zhijia Chen, Dape...
SRDS
2007
IEEE
14 years 4 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim
SIGKDD
2008
138views more  SIGKDD 2008»
13 years 10 months ago
PinKDD'08: privacy, security, and trust in KDD post workshop report
This report summarizes the events of the 2nd International Workshop on Privacy, Security, and Trust in KDD, at the 14th ACM SIGKDD International Conference on Knowledge Discovery ...
Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradle...