Sciweavers

897 search results - page 144 / 180
» Security Requirements for RFID Computing Systems
Sort
View
GCC
2005
Springer
14 years 1 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao
GRID
2003
Springer
14 years 1 months ago
From Web Services to OGSA: Experiences in Implementing an OGSA-based Grid Application
In previous work we have presented the ZENTURIO experiment management system for performance and parameter studies of parallel and distributed applications on cluster and Grid arc...
Radu Prodan, Thomas Fahringer
IJNSEC
2011
78views more  IJNSEC 2011»
13 years 3 months ago
Multi-authority Electronic Voting Scheme Based on Elliptic Curves
In this paper, a new multi authority electronic voting scheme based on elliptic curves is proposed. According to the proposed scheme, each voter casts the vote as a point on the e...
Chinniah Porkodi, Ramalingam Arumuganathan, Krishn...
SAC
2010
ACM
14 years 2 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
CORR
2011
Springer
196views Education» more  CORR 2011»
12 years 12 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum