Sciweavers

2028 search results - page 97 / 406
» Deriving Relation Keys from XML Keys
Sort
View
POPL
2008
ACM
16 years 4 months ago
Engineering formal metatheory
Machine-checked proofs of properties of programming languages have become a critical need, both for increased confidence in large and complex designs and as a foundation for techn...
Arthur Charguéraud, Benjamin C. Pierce, Bri...
CIIT
2007
168views Communications» more  CIIT 2007»
15 years 5 months ago
Link dynamic and mobility measure of a manet with the brownian mobility model
To characterize the behavior of a mobile ad-hoc network (MANET), the Brownian mobility model is studied, where the random coordinators of mobile nodes are modeled by the Brownian ...
Yawgeng A. Chau, Yao-Hua Chen
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 2 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
WS
2004
ACM
15 years 9 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
15 years 7 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier