Sciweavers

503 search results - page 32 / 101
» An Independence Relation for Sets of Secrets
Sort
View
DEXA
1994
Springer
92views Database» more  DEXA 1994»
14 years 2 months ago
OR-SML: A Functional Database Programming Language for Disjunctive Information and Its Applications
We describe a functional database language OR-SML for handling disjunctive information in database queries, and its implementation on top of Standard ML 12]. The core language has ...
Elsa L. Gunter, Leonid Libkin
NDSS
2008
IEEE
14 years 5 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
DSN
2007
IEEE
14 years 5 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
SIGOPS
1998
123views more  SIGOPS 1998»
13 years 10 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
CISM
1993
149views GIS» more  CISM 1993»
14 years 2 months ago
The Weak Instance Model
The weak instance model is a framework to consider the relations in a database as a whole, regardless of the way attributes are grouped in the individual relations. Queries and upd...
Paolo Atzeni, Riccardo Torlone