Sciweavers

1628 search results - page 48 / 326
» Compiler Construction Using Scheme
Sort
View
DCC
2006
IEEE
14 years 9 months ago
A Fuzzy Vault Scheme
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value in a fuzzy vault and "lock" it using ...
Ari Juels, Madhu Sudan
ICSE
2010
IEEE-ACM
14 years 2 months ago
Views: object-inspired concurrency control
We present views, a new approach to controlling concurrency. Fine-grained locking is often necessary to increase concurrency. Correctly implementing fine-grained locking with tod...
Brian Demsky, Patrick Lam
ASIACRYPT
2000
Springer
14 years 2 months ago
A New Forward-Secure Digital Signature Scheme
nded abstract of this work appears Advances in Cryptology — Asiacrypt 2000, Tatsuaki Okamoto, editor, Lecture Notes in Computer Science vol. 1976, Springer-Verlag, 2000. c IACR A...
Michel Abdalla, Leonid Reyzin
ESAS
2007
Springer
14 years 4 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
SIGMOD
2005
ACM
145views Database» more  SIGMOD 2005»
14 years 10 months ago
Native Xquery processing in oracle XMLDB
With XQuery becoming the standard language for querying XML, and the relational SQL platform being recognized as an important platform to store and process XML, the SQL/XML standa...
Zhen Hua Liu, Muralidhar Krishnaprasad, Vikas Aror...