Sciweavers

516 search results - page 76 / 104
» Comparing Two Information Flow Security Properties
Sort
View
IFIP
2009
Springer
14 years 3 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
INFOCOM
2002
IEEE
14 years 1 months ago
Improving BGP Convergence Through Consistency Assertions
— This paper presents a new mechanism for improving the convergence properties of path vector routing algorithms, such as BGP. Using a route’s path information, we develop two ...
Dan Pei, Xiaoliang Zhao, Lan Wang, Daniel Massey, ...
AUSAI
2009
Springer
14 years 3 days ago
Adapting Spectral Co-clustering to Documents and Terms Using Latent Semantic Analysis
Abstract. Spectral co-clustering is a generic method of computing coclusters of relational data, such as sets of documents and their terms. Latent semantic analysis is a method of ...
Laurence A. F. Park, Christopher Leckie, Kotagiri ...
CAISE
1999
Springer
14 years 1 months ago
Towards a Classification Framework for Application Granularity in Workflow Management Systems
The support of process enactment through the use of workflow management systems has gained considerable attention within the last few years. We develop a classification framework c...
Jörg Becker, Michael zur Muehlen
EUROCRYPT
1999
Springer
14 years 1 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier