Sciweavers

2028 search results - page 117 / 406
» Deriving Relation Keys from XML Keys
Sort
View
ECIS
2000
15 years 5 months ago
Towards a Grounded Theory of Information Systems for the International Firm: Critical Variables and Causal Networks
-International Information Systems, often of critical importance for the operations of the multinational enterprise, are poorly researches and there is a dearth of theoretical fram...
Hans P. Lehmann
COCO
2005
Springer
150views Algorithms» more  COCO 2005»
15 years 10 months ago
The Quantum Adversary Method and Classical Formula Size Lower Bounds
We introduce two new complexity measures for Boolean functions, which we name sumPI and maxPI. The quantity sumPI has been emerging through a line of research on quantum query com...
Sophie Laplante, Troy Lee, Mario Szegedy
ASIACRYPT
2006
Springer
15 years 8 months ago
Secure Sketch for Biometric Templates
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a ske...
Qiming Li, Yagiz Sutcu, Nasir D. Memon
SRDS
2003
IEEE
15 years 9 months ago
SNARE: A Strong Security Scheme for Network-Attached Storage
This paper presents a strong security scheme for network-attached storage (NAS) that is based on capability and uses a key distribution scheme to keep network-attached storage fro...
Yingwu Zhu, Yiming Hu
NSDI
2008
15 years 6 months ago
Ad-hoc Guesting: When Exceptions Are the Rule
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnogr...
Brinda Dalal, Les Nelson, Diana K. Smetters, Natha...