In this paper, we investigate allocation of data partitions in the network for data objects that are partitioned by using secret sharing schemes [12] or erasure coding schemes [11...
- The era of new wireless communications is upon us. Eventually it will penetrate into our daily life and change the way we live just like many technological innovations whose orig...
A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardwareonly context. Se...
Brian J. d'Auriol, Tuyen Nguyen, Vo Quoc Hung, Duc...
- The authors believe that providing security for supercomputer clusters is different from providing security for stand-alone PCs. The types of programs that supercomputer clusters...