Sciweavers

69 search results - page 8 / 14
» Temporal Verification in Secure Group Communication System D...
Sort
View
CIS
2007
Springer
14 years 1 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...
PDPTA
2008
13 years 8 months ago
Intrusion-Tolerant Dissemination in Large-Scale Systems
Abstract - With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust i...
Kim Potter Kihlstrom, Robin Elliott, Kelsey Marshm...
IJNSEC
2010
66views more  IJNSEC 2010»
13 years 2 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
DOCENG
2009
ACM
14 years 1 months ago
Declarative interfaces for dynamic widgets communications
Widgets are small and focused multimedia applications that can be found on desktop computers, mobile devices or even TV sets. Widgets rely on structured documents to describe thei...
Cyril Concolato, Jean Le Feuvre, Jean-Claude Dufou...
CHI
2007
ACM
14 years 7 months ago
Appropriation of a MMS-based comic creator: from system functionalities to resources for action
Technologies can be used ? or appropriated ? in different ways by different users, but how do the use patterns evolve, and how can design facilitate such evolution? This paper app...
Antti Salovaara