Sciweavers

1528 search results - page 189 / 306
» On Signatures for Communication Graphs
Sort
View
XMLSEC
2003
ACM
15 years 8 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
JOC
2008
86views more  JOC 2008»
15 years 3 months ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell
164
Voted
PODC
2012
ACM
13 years 5 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
ICIP
2002
IEEE
16 years 4 months ago
Advanced animation framework for virtual character within the MPEG-4 standard
This paper presents an advanced animation framework for virtual character within the MPEG-4 standard. The Bonebased Animation (BBA) specifications are described and it is shown ho...
Françoise J. Prêteux, Marius Preda
IPPS
2009
IEEE
15 years 9 months ago
Deadlock prevention by turn prohibition in interconnection networks
Abstract—In this paper we consider the problem of constructing minimal cycle-breaking sets of turns for graphs that model communication networks, as a method to prevent deadlocks...
Lev B. Levitin, Mark G. Karpovsky, Mehmet Mustafa