Sciweavers

2702 search results - page 311 / 541
» Message from the Editor
Sort
View
VLDB
1989
ACM
155views Database» more  VLDB 1989»
15 years 8 months ago
Parallel Processing of Recursive Queries in Distributed Architectures
This paper presents a parallel algorithm for recursive query processing and shows how it can be efficiently implemented in a local computer network. The algorithm relies on an int...
Guy Hulin
PKC
2010
Springer
193views Cryptology» more  PKC 2010»
15 years 8 months ago
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction follows that of Gentry by producing a fully homomorphic s...
Nigel P. Smart, Frederik Vercauteren
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin
ECBS
2009
IEEE
101views Hardware» more  ECBS 2009»
15 years 8 months ago
Structured Formalization of Service-Oriented Specifications
We present and formalize concepts for the structured specification of system behavior based on services. Services are patterns of interaction between reactive components, thus sup...
Markus Herrmannsdoerfer, Sabine Rittmann, Bernhard...
GLOBECOM
2007
IEEE
15 years 8 months ago
Resource Efficient Survivable Clustering for Wireless Sensor Networks
Abstract-- In this paper, we address both lifetime and survivability issues in wireless sensor networks (WSNs). We present an easy-to-implement clustering method called DED (distri...
Mohammad Masud Hasan, Jason P. Jue