Sciweavers

1770 search results - page 212 / 354
» Writing requirements in computer security
Sort
View
PDPTA
2004
13 years 12 months ago
An Integrated Global Service for File Transfer and Management in a Network (FTM)
The management and access of distributed informational resources has emerged as an important requirement for scientific simulations using high-performance computing facilities. Bot...
Jim Almond, Peggy Lindner
PERCOM
2010
ACM
13 years 8 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
EGC
2005
Springer
14 years 4 months ago
Grid Access Middleware for Handheld Devices
Abstract. Grid technology attempts to support flexible, secure, coordinated information sharing among dynamic collections of individuals, institutions, and resources. The use of G...
Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee, Tae...
IEEEHPCS
2010
13 years 8 months ago
Fast learning for multibiometrics systems using genetic algorithms
The performance (in term of error rate) of biometric systems can be improved by combining them. Multiple fusion techniques can be applied from classical logical operations to more...
Romain Giot, Mohamad El-Abed, Christophe Rosenberg...
USS
2010
13 years 8 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...