메뉴 건너뛰기




Volumn 3531, Issue , 2005, Pages 122-137

Searching for high-value rare events with uncheatable grid computing

Author keywords

Cheating; Cryptographic hash functions; Grid computing; Obfuscation; Security

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; FUNCTIONS; SECURITY OF DATA;

EID: 26444461543     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496137_9     Document Type: Conference Paper
Times cited : (21)

References (18)
  • 1
    • 84886023553 scopus 로고    scopus 로고
    • Generating satisfiable problem instances
    • Dimitris Achlioptas, Carla P. Gomes, Henry A. Kautz, and Bart Selman. Generating satisfiable problem instances. In AAAI/IAAI, pages 256-261, 2000.
    • (2000) AAAI/IAAI , pp. 256-261
    • Achlioptas, D.1    Gomes, C.P.2    Kautz, H.A.3    Selman, B.4
  • 2
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. Lecture Notes in Computer Science, 1592:402-414, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 5
    • 84949235873 scopus 로고    scopus 로고
    • Secure distributed computing in a commercial environment
    • P. Syverson, editor, Proceedings of Financial Crypto 2001, Springer-Verlag
    • P. Golle and S. Stubblebine. Secure distributed computing in a commercial environment. In P. Syverson, editor, Proceedings of Financial Crypto 2001, volume 2339 of Lecture Notes in Computer Science, pages 289-304. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2339 , pp. 289-304
    • Golle, P.1    Stubblebine, S.2
  • 8
    • 26444620946 scopus 로고    scopus 로고
    • Cheaters bow to peer pressure
    • Feb. 15
    • L. Kahney. Cheaters bow to peer pressure. Wired Magazine, Feb. 15, 2001.
    • (2001) Wired Magazine
    • Kahney, L.1
  • 9
  • 10
    • 0034140491 scopus 로고    scopus 로고
    • Logical cryptanalysis as a SAT problem: The encoding of the Data Encryption Standard
    • F. Massacci and L. Marraro. Logical cryptanalysis as a SAT problem: The encoding of the Data Encryption Standard. Journal of Automated Reasoning, 24(1-2): 165-203, 2000.
    • (2000) Journal of Automated Reasoning , vol.24 , Issue.1-2 , pp. 165-203
    • Massacci, F.1    Marraro, L.2
  • 12
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts, springer-verlag
    • T. Sander and C. F. Tschudin. Protecting mobile agents against malicious hosts, springer-verlag. Lecture Notes in Computer Science, 1419:44-60, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 15
    • 0003254747 scopus 로고    scopus 로고
    • Mobile agents and security
    • Springer
    • G. Vigna, editor. Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science. Springer, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419
    • Vigna, G.1
  • 18
    • 84982946701 scopus 로고    scopus 로고
    • A sanctuary for mobile agents
    • B. S. Yee. A sanctuary for mobile agents. In Secure Internet Programming, pages 261-273, 1999.
    • (1999) Secure Internet Programming , pp. 261-273
    • Yee, B.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.