Sciweavers

152 search results - page 22 / 31
» Full Abstraction for Reduced ML
Sort
View
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 1 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
APWEB
2004
Springer
14 years 1 months ago
Multiresolution Spatial Databases: Making Web-Based Spatial Applications Faster
Abstract. Spatial data has now been used extensively in the Web environment, providing online customized maps and supporting map-based applications. The full potential of Web-based...
Xiaofang Zhou, Sham Prasher, Sai Sun, Kai Xu 0003
EUROCRYPT
2004
Springer
14 years 1 months ago
Dining Cryptographers Revisited
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by Chaum for anonymous message publication. A very attractive feature of the basic D...
Philippe Golle, Ari Juels
ICSOC
2003
Springer
14 years 1 months ago
PANDA: Specifying Policies for Automated Negotiations of Service Contracts
Abstract. The Web and Grid services frameworks provide a promising infrastructure for cross-organizational use of online services. The use of services in large-scale and cross-orga...
Henner Gimpel, Heiko Ludwig, Asit Dan, Robert Kear...
ADBIS
2003
Springer
204views Database» more  ADBIS 2003»
14 years 3 days ago
Hierarchical Bitmap Index: An Efficient and Scalable Indexing Technique for Set-Valued Attributes
Abstract. Set-valued attributes are convenient to model complex objects occurring in the real world. Currently available database systems support the storage of set-valued attribut...
Mikolaj Morzy, Tadeusz Morzy, Alexandros Nanopoulo...