Sciweavers

35419 search results - page 240 / 7084
» How are we doing
Sort
View
CSFW
2000
IEEE
15 years 9 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider
169
Voted
ADL
2000
Springer
276views Digital Library» more  ADL 2000»
15 years 9 months ago
Invading the Fortress: How to Besiege Reinforced Information Bunkers
Information retrieval (IR) research has been very active over the last decades to develop approaches that allow machine indexing to significantly improve indexing practice in lib...
Jeroen Hoppenbrouwers, Hans Paijmans
VLDB
1990
ACM
86views Database» more  VLDB 1990»
15 years 8 months ago
How to Forget the Past Without Repeating It
Bottom-up evaluation of deductive database programs has the advantage that it avoids repeated computation by storing all intermediate results and replacing recomputation by table ...
Jeffrey F. Naughton, Raghu Ramakrishnan
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
FQAS
2006
Springer
100views Database» more  FQAS 2006»
15 years 8 months ago
Highly Heterogeneous XML Collections: How to Retrieve Precise Results?
Abstract. Highly heterogeneous XML collections are thematic collections exploiting different structures: the parent-child or ancestor-descendant relationships are not preserved and...
Ismael Sanz, Marco Mesiti, Giovanna Guerrini, Rafa...