-
1
-
-
51049112278
-
A new mechanism for resource monitoring in grid computing
-
W. Chung, and R. Chang A new mechanism for resource monitoring in grid computing Future Generation of Computer Systems 25 1 2009 1 7
-
(2009)
Future Generation of Computer Systems
, vol.25
, Issue.1
, pp. 1-7
-
-
Chung, W.1
Chang, R.2
-
2
-
-
55949124737
-
Secure on-demand grid computing
-
M. Smith, M. Schmidt, N. Fallenbeck, T. Dornemann, C. Schridde, and B. Freisleben Secure on-demand grid computing Future Generation of Computer Systems 25 3 2009 315 325
-
(2009)
Future Generation of Computer Systems
, vol.25
, Issue.3
, pp. 315-325
-
-
Smith, M.1
Schmidt, M.2
Fallenbeck, N.3
Dornemann, T.4
Schridde, C.5
Freisleben, B.6
-
3
-
-
34247614499
-
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
-
DOI 10.1016/j.future.2006.12.004, PII S0167739X06002159
-
X. Zou, Y. Dai, and X. Ran Dual-level key management for secure grid communication in dynamic and hierarchical groups Future Generation of Computer Systems 23 6 2007 776 786 (Pubitemid 46686825)
-
(2007)
Future Generation Computer Systems
, vol.23
, Issue.6
, pp. 776-786
-
-
Zou, X.1
Dai, Y.-S.2
Ran, X.3
-
4
-
-
69549130719
-
JXTA resource access control by means of advertisement encryption
-
A. Joan, and H. Jordi JXTA resource access control by means of advertisement encryption Future Generation of Computer Systems 26 1 2010 21 28
-
(2010)
Future Generation of Computer Systems
, vol.26
, Issue.1
, pp. 21-28
-
-
Joan, A.1
Jordi, H.2
-
5
-
-
77950298046
-
Constructing trusted virtual execution environment in P2P grids
-
D. Zou, W. Zheng, J. Long, H. Jin, and X. Chen Constructing trusted virtual execution environment in P2P grids Future Generation of Computer Systems 26 5 2010 769 775
-
(2010)
Future Generation of Computer Systems
, vol.26
, Issue.5
, pp. 769-775
-
-
Zou, D.1
Zheng, W.2
Long, J.3
Jin, H.4
Chen, X.5
-
7
-
-
77957927176
-
Semantic-based authorization architecture for Grid
-
J. Perez, J. Bernabe, J. Calero, F. Clemente, G. Perez, and A. Skarmeta Semantic-based authorization architecture for Grid Future Generation of Computer Systems 27 1 2011 40 55
-
(2011)
Future Generation of Computer Systems
, vol.27
, Issue.1
, pp. 40-55
-
-
Perez, J.1
Bernabe, J.2
Calero, J.3
Clemente, F.4
Perez, G.5
Skarmeta, A.6
-
8
-
-
77957891095
-
A potential HTTP-based application-level attack against Tor
-
X. Wang, J. Luo, M. Yang, and Z. Ling A potential HTTP-based application-level attack against Tor Future Generation of Computer Systems 27 1 2011 67 77
-
(2011)
Future Generation of Computer Systems
, vol.27
, Issue.1
, pp. 67-77
-
-
Wang, X.1
Luo, J.2
Yang, M.3
Ling, Z.4
-
9
-
-
0025208441
-
Optimized broadcasting technique for WK-recursive topologies
-
DOI 10.1016/0167-739X(90)90034-B
-
G. Vecchia, and C. San An optimized broadcasting technique for WK-recursive topologies Future Generation of Computer Systems 5 4 1990 353 357 (Pubitemid 20658390)
-
(1990)
Future Generation Computer Systems
, vol.5
, Issue.4
, pp. 353-357
-
-
Vecchia G.Della1
Sanges, C.2
-
10
-
-
0344089052
-
A new key assignment scheme for enforcing complicated access control policies in hierarchy
-
I. Lin, M. Hwang, and C. Chang A new key assignment scheme for enforcing complicated access control policies in hierarchy Future Generation of Computer Systems 19 4 2003 457 462
-
(2003)
Future Generation of Computer Systems
, vol.19
, Issue.4
, pp. 457-462
-
-
Lin, I.1
Hwang, M.2
Chang, C.3
-
11
-
-
0348107035
-
Generalized data retrieval for pyramid-based periodic broadcasting of videos
-
J. Kwon, and H. Yeom Generalized data retrieval for pyramid-based periodic broadcasting of videos Future Generation of Computer Systems 20 1 2004 157 170
-
(2004)
Future Generation of Computer Systems
, vol.20
, Issue.1
, pp. 157-170
-
-
Kwon, J.1
Yeom, H.2
-
12
-
-
34247603985
-
Tree-based group key agreement framework for mobile ad-hoc networks
-
DOI 10.1016/j.future.2007.01.001, PII S0167739X07000052
-
L. Liao, and M. Manulis Tree-based group key agreement framework for mobile ad-hoc networks Future Generation of Computer Systems 23 6 2007 787 803 (Pubitemid 46686830)
-
(2007)
Future Generation Computer Systems
, vol.23
, Issue.6
, pp. 787-803
-
-
Liao, L.1
Manulis, M.2
-
13
-
-
55949127034
-
A multilayered digital content distribution using a group-key based on web
-
Y. Na, I. Ko, and S. Xu A multilayered digital content distribution using a group-key based on web Future Generation of Computer Systems 25 3 2009 371 377
-
(2009)
Future Generation of Computer Systems
, vol.25
, Issue.3
, pp. 371-377
-
-
Na, Y.1
Ko, I.2
Xu, S.3
-
14
-
-
70449533778
-
DHT-based lightweight broadcast algorithms in large-scale computing infrastructures
-
K. Huang, and D. Zhang DHT-based lightweight broadcast algorithms in large-scale computing infrastructures Future Generation of Computer Systems 26 3 2010 291 303
-
(2010)
Future Generation of Computer Systems
, vol.26
, Issue.3
, pp. 291-303
-
-
Huang, K.1
Zhang, D.2
-
15
-
-
77955713354
-
Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint
-
K. Wang, J. Li, and L. Pan Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint Future Generation of Computer Systems 26 7 2010 986 1002
-
(2010)
Future Generation of Computer Systems
, vol.26
, Issue.7
, pp. 986-1002
-
-
Wang, K.1
Li, J.2
Pan, L.3
-
16
-
-
77957925878
-
OMASa flexible multi-agent environment for CSCWD
-
J. Barthes OMASa flexible multi-agent environment for CSCWD Future Generation of Computer Systems 27 1 2011 78 87
-
(2011)
Future Generation of Computer Systems
, vol.27
, Issue.1
, pp. 78-87
-
-
Barthes, J.1
-
17
-
-
79951853478
-
A novel reputation computation model based on subjective logic for mobile ad hoc networks
-
10.1016/j.future.2010.03.006
-
Y. Liu, K. Li, Y. Jin, Y. Zhang, and W. Qu A novel reputation computation model based on subjective logic for mobile ad hoc networks Future Generation Computer Systems 2010 10.1016/j.future.2010.03.006
-
(2010)
Future Generation Computer Systems
-
-
Liu, Y.1
Li, K.2
Jin, Y.3
Zhang, Y.4
Qu, W.5
-
18
-
-
0000753607
-
Broadcasting cryptosystem in computer networks using interpolating polynomials
-
C. Chang, and T. Wu Broadcasting cryptosystem in computer networks using interpolating polynomials Computer Systems Science and Engineering 6 3 1991 185 188
-
(1991)
Computer Systems Science and Engineering
, vol.6
, Issue.3
, pp. 185-188
-
-
Chang, C.1
Wu, T.2
-
22
-
-
0033221876
-
Security of broadcasting cryptosystem in computer networks
-
DOI 10.1049/el:19991431
-
H. Sun Security of broadcasting cryptosystem in computer networks Electronics Letters 35 1999 2108 2109 (Pubitemid 32082216)
-
(1999)
Electronics Letters
, vol.35
, Issue.24
, pp. 2108-2109
-
-
Sun, H.-M.1
-
23
-
-
0035370195
-
Cryptanalysis of Liaw's broadcasting cryptosystem
-
DOI 10.1016/S0898-1221(01)00122-5, PII S0898122101001225
-
Y. Tseng, and J. Jan Cryptanalysis of Liaw's broadcasting cryptosystem Computers & Mathematics with Applications 41 2001 1575 1578 (Pubitemid 32471108)
-
(2001)
Computers and Mathematics with Applications
, vol.41
, Issue.12
, pp. 1575-1578
-
-
Tseng, Y.-M.1
Jan, J.-K.2
-
26
-
-
51249102359
-
General weakness in certain broadcast encryption protocols employing the remainder approach
-
ICC
-
W. Zhu, General weakness in certain broadcast encryption protocols employing the remainder approach, in: Proceedings of the 2008 IEEE International Conference on Communications, ICC 2008, pp. 16201624.
-
(2008)
Proceedings of the 2008 IEEE International Conference on Communications
, pp. 1620-1624
-
-
Zhu, W.1
-
27
-
-
69949100152
-
Broadcast authentication with preferred verifiers
-
M. Ramkumar Broadcast authentication with preferred verifiers International Journal of Network Security 4 2 2007 166 178
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 166-178
-
-
Ramkumar, M.1
-
28
-
-
69949088508
-
Anonymity in wireless broadcast networks
-
M. Blaze, J. Ioannidis, A. Keromytis, T. Malkin, and A. Rubin Anonymity in wireless broadcast networks International Journal of Network Security 8 1 2009 37 51
-
(2009)
International Journal of Network Security
, vol.8
, Issue.1
, pp. 37-51
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.3
Malkin, T.4
Rubin, A.5
-
29
-
-
48049122435
-
Security of the redefined Liaw's broadcasting cryptosystem
-
W. Zhu, and C. Wu Security of the redefined Liaw's broadcasting cryptosystem Computers & Mathematics with Applications 56 2008 1665 1667
-
(2008)
Computers & Mathematics with Applications
, vol.56
, pp. 1665-1667
-
-
Zhu, W.1
Wu, C.2
-
32
-
-
79951857004
-
How grid computing works
-
25 April
-
J. Strickland, How grid computing works, HowStuffWorks.com, 25 April 2008, http://communication.howstuffworks.com/grid-computing.htm.
-
(2008)
HowStuffWorks.com
-
-
Strickland, J.1
|