Sciweavers

1229 search results - page 138 / 246
» Trusted Computing
Sort
View
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
13 years 10 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
PROVSEC
2007
Springer
14 years 4 months ago
Practical Threshold Signatures Without Random Oracles
We propose a secure threshold signature scheme without trusted dealer. Our construction is based on the recently proposed signature scheme of Waters in EUROCRYPT’05. The new thre...
Jin Li, Tsz Hon Yuen, Kwangjo Kim
COLCOM
2005
IEEE
14 years 3 months ago
SLACER: randomness to cooperation in peer-to-peer networks
Peer-to-peer applications can benefit from human friendship networks (e.g., e-mail contacts or instant message buddy lists). However these are not always available. We propose an...
David Hales, Stefano Arteconi, Özalp Babaoglu
GCC
2004
Springer
14 years 3 months ago
A Novel VO-Based Access Control Model for Grid
As an important aspect of grid security, access control model gets more and more attention. Entities in virtual organizations (VOs) must establish a dynamic, secure and cooperative...
Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou
IPTPS
2004
Springer
14 years 3 months ago
2 P2P or Not 2 P2P?
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge how suitable a P2P solution might be for a particular problem. It is bas...
Mema Roussopoulos, Mary Baker, David S. H. Rosenth...