Sciweavers

2028 search results - page 31 / 406
» Deriving Relation Keys from XML Keys
Sort
View
161
Voted
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
136
Voted
CCS
2009
ACM
16 years 4 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
110
Voted
BMCBI
2006
82views more  BMCBI 2006»
15 years 3 months ago
Prediction of a key role of motifs binding E2F and NR2F in down-regulation of numerous genes during the development of the mouse
Background: We previously demonstrated that gene expression profiles during neuronal differentiation in vitro and hippocampal development in vivo were very similar, due to a conse...
Michal Dabrowski, Stein Aerts, Bozena Kaminska
139
Voted
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 3 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
142
Voted
SYRCODIS
2007
72views Database» more  SYRCODIS 2007»
15 years 4 months ago
An XML-to-Relational User-Driven Mapping Strategy Based on Similarity and Adaptivity
As XML has become a standard for data representation, it is inevitable to propose and implement techniques for efficient managing of XML data. A natural alternative is to exploit...
Irena Mlynkova