Sciweavers

6164 search results - page 1176 / 1233
» Teaching Computer Security
Sort
View
HPDC
2010
IEEE
15 years 3 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
131
Voted
MOBICOM
2010
ACM
15 years 2 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
138
Voted
MOBICOM
2010
ACM
15 years 2 months ago
Challenge: mobile optical networks through visual MIMO
Mobile optical communications has so far largely been limited to short ranges of about ten meters, since the highly directional nature of optical transmissions would require costl...
Ashwin Ashok, Marco Gruteser, Narayan Mandayam, Ja...
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
15 years 2 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
147
Voted
GRID
2007
Springer
15 years 2 months ago
Quality of Service Negotiation for Commercial Medical Grid Services
The GEMSS project has developed a service-oriented Grid that supports the provision of medical simulation services by service providers to clients such as hospitals. We outline the...
Stuart E. Middleton, Mike Surridge, Siegfried Benk...
« Prev « First page 1176 / 1233 Last » Next »