Sciweavers

930 search results - page 118 / 186
» A Universal Encryption Standard
Sort
View
EUROCRYPT
2005
Springer
14 years 3 months ago
Smooth Projective Hashing and Two-Message Oblivious Transfer
We present a general framework for constructing two-message oblivious transfer protocols using a modification of Cramer and Shoup’s notion of smooth projective hashing (2002). ...
Yael Tauman Kalai
CSFW
2012
IEEE
12 years 16 days ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
EDBT
2006
ACM
124views Database» more  EDBT 2006»
14 years 10 months ago
Supporting Temporal Slicing in XML Databases
Nowadays XML is universally accepted as the standard for structural data representation; XML databases, providing structural querying support, are thus becoming more and more popul...
Federica Mandreoli, Riccardo Martoglia, Enrico Ron...
TACAS
2009
Springer
134views Algorithms» more  TACAS 2009»
14 years 4 months ago
Compositional Predicate Abstraction from Game Semantics
ional Predicate Abstraction from Game Semantics Adam Bakewell and Dan R. Ghica University of Birmingham, U.K. We introduce a technique for using conventional predicate abstraction ...
Adam Bakewell, Dan R. Ghica
EUROMICRO
2009
IEEE
14 years 4 months ago
A Component-Based Technology for Hardware and Software Components
One of the challenges in development of embedded systems is to cope with hardware and software components simultaneously. Often is their integration cumbersome due to their incomp...
Luka Lednicki, Ana Petricic, Mario Zagar