Sciweavers

109 search results - page 18 / 22
» Security Considerations for a Distributed Location Service
Sort
View
WWW
2003
ACM
14 years 8 months ago
Evaluation of edge caching/offloading for dynamic content delivery
As dynamic content becomes increasingly dominant, it becomes an important research topic as how the edge resources such as client-side proxies, which are otherwise underutilized f...
Chun Yuan, Yu Chen, Zheng Zhang
JCS
2010
104views more  JCS 2010»
13 years 6 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
SIGOPS
2010
272views more  SIGOPS 2010»
13 years 6 months ago
The Akamai network: a platform for high-performance internet applications
Comprising more than 61,000 servers located across nearly 1,000 networks in 70 countries worldwide, the Akamai platform delivers hundreds of billions of Internet interactions dail...
Erik Nygren, Ramesh K. Sitaraman, Jennifer Sun
SAC
2008
ACM
13 years 7 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
DIM
2005
ACM
13 years 9 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...