Sciweavers

2702 search results - page 352 / 541
» Message from the Editor
Sort
View
117
Voted
ASIACRYPT
2005
Springer
15 years 9 months ago
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Abstract. We give improved upper bounds on the communication complexity of optimally-resilient secure multiparty computation in the cryptographic model. We consider evaluating an n...
Martin Hirt, Jesper Buus Nielsen
DAWAK
2005
Springer
15 years 9 months ago
Event-Feeded Dimension Solution
Abstract. From the point of view of a data warehouse system its part of collecting and receiving information from other systems is crucial for all subsequent business intelligence ...
Tho Manh Nguyen, Jaromir Nemec, Martin Windisch
ICSOC
2005
Springer
15 years 9 months ago
Handling Faults in Decentralized Orchestration of Composite Web Services
Abstract. Composite web services can be orchestrated in a decentralized manner by breaking down the original service specification into a set of partitions and executing them on a...
Girish Chafle, Sunil Chandra, Pankaj Kankar, Vijay...
IH
2005
Springer
15 years 9 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
KIVS
2005
Springer
15 years 9 months ago
Combining Service-Orientation and Peer-to-Peer Networks
: Almost all current P2P applications are built as monolithic systems: they tightly couple application software with an underlying P2P technology. For simple P2P applications like ...
Michael Conrad, Jochen Dinger, Hannes Hartenstein,...