메뉴 건너뛰기




Volumn 24, Issue , 2004, Pages 600-607

On the confidential auditing of distributed computing systems

Author keywords

Anonymity; Auditing; Authenticity; Cluster; Commutative cryptography; Secure distributed computing

Indexed keywords

COMPUTER ARCHITECTURE; CRYPTOGRAPHY; DATA REDUCTION; INFORMATION SCIENCE; QUERY LANGUAGES; ROUTERS;

EID: 2442605632     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icdcs.2004.1281627     Document Type: Conference Paper
Times cited : (5)

References (30)
  • 7
    • 84952535645 scopus 로고    scopus 로고
    • Providing auditing while protecting privacy
    • L. Jean Camp and J.D. Tygar, "Providing Auditing While Protecting Privacy." The Information Society, 10(1), pp. 59-72, 1998.
    • (1998) The Information Society , vol.10 , Issue.1 , pp. 59-72
    • Jean Camp, L.1    Tygar, J.D.2
  • 16
    • 85014508412 scopus 로고
    • Multiparty computation with faulty majority
    • Berlin, Aug. Springer
    • D. Beaver and S. Goldwasser. Multiparty computation with faulty majority. In Advances in Cryptology: CRYPTO '89, pages 589-590, Berlin, Aug. 1990. Springer.
    • (1990) Advances in Cryptology: CRYPTO '89 , pp. 589-590
    • Beaver, D.1    Goldwasser, S.2
  • 19
    • 17444394365 scopus 로고    scopus 로고
    • Simplified VSS and fast-track multi-party computations with applications to threshold cryptography
    • R. Gennaro, M. Rabin, T. Rabin, "Simplified VSS and Fast-Track Multi-party Computations with Applications to Threshold Cryptography." ACM PODC'98, 1998.
    • (1998) ACM PODC'98
    • Gennaro, R.1    Rabin, M.2    Rabin, T.3
  • 21
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • S. C. Pohlig and M. E. Hellman, "An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance." IEEE Trans. Inform. Theory IT-24, pp. 106-110, 1978.
    • (1978) IEEE Trans. Inform. Theory IT-24 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 28
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B. Neumann and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Communications Magazine, 32(9), pp 33-38, 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neumann, B.1    Ts'o, T.2
  • 30
    • 2442442207 scopus 로고    scopus 로고
    • On the evidence based peer-to-peer resource management in distributed computing system
    • Department of Computer Science, Texas A & M University
    • T.C. Lam and Jyh-Cham Liu "On the Evidence based Peer-to-Peer Resource Management in Distributed Computing System" Technical Report 2003-7-2, Department of Computer Science, Texas A & M University, 2003.
    • (2003) Technical Report 2003-7-2
    • Lam, T.C.1    Liu, J.-C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.