Sciweavers

563 search results - page 93 / 113
» Verifiable Signature Sharing
Sort
View
WISE
2002
Springer
14 years 1 months ago
A Content-Based Resource Location Mechanism in PeerIS
With the flurry of research on P2P computing, many P2P technical challenges have emerged, one of which is how to efficiently locate desired resources. Advances have been made in...
Bo Ling, Zhiguo Lu, Wee Siong Ng, Beng Chin Ooi, K...
CSCW
2000
ACM
14 years 1 months ago
Copies convergence in a distributed real-time collaborative environment
In real−time collaborative systems, replicated objects, shared by users, are subject to concurrency constraints. In order to satisfy these, various algorithms, qualified as op...
Nicolas Vidot, Michèle Cart, Jean Ferri&eac...
CSMR
1998
IEEE
14 years 1 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
CCS
2006
ACM
14 years 17 days ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
FASE
2006
Springer
14 years 15 days ago
Relation of Code Clones and Change Couplings
Abstract. Code clones have long been recognized as bad smells in software systems and are considered to cause maintenance problems during evolution. It is broadly assumed that the ...
Reto Geiger, Beat Fluri, Harald Gall, Martin Pinzg...