Sciweavers

36 search results - page 2 / 8
» A Secure Two Phase Locking Protocol
Sort
View
CRYPTO
2010
Springer
158views Cryptology» more  CRYPTO 2010»
13 years 12 months ago
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...
JWSR
2008
99views more  JWSR 2008»
13 years 10 months ago
A Reservation-based Extended Transaction Protocol for Coordination of Web Services
: Web Services can be used to automate business activities that span multiple enterprises over the Internet. Such business activities require a coordination protocol to reach consi...
Wenbing Zhao, Firat Kart, Louise E. Moser, P. M. M...
IS
2000
13 years 10 months ago
Concurrency control in mobile distributed real-time database systems
Abstract With the rapid advances in mobile computing technology, there is an increasing demand for processing realtime transactions in a mobile environment. This paper studies con...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...
TCC
2012
Springer
245views Cryptology» more  TCC 2012»
12 years 6 months ago
Secure Two-Party Computation with Low Communication
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
Ivan Damgård, Sebastian Faust, Carmit Hazay
SIGMOD
2004
ACM
114views Database» more  SIGMOD 2004»
14 years 11 months ago
Evaluating lock-based protocols for cooperation on XML documents
We discuss four different core protocols for synchronizing access to and modifications of XML document collections. These core protocols synchronize structure traversals and modif...
Sven Helmer, Carl-Christian Kanne, Guido Moerkotte