Sciweavers

609 search results - page 38 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
SEKE
2007
Springer
14 years 4 months ago
A Semantical Change Detection Algorithm for XML
XML diff algorithms proposed in the literature have focused on the structural analysis of the document. When XML is used for data exchange, or when different versions of a documen...
Rodrigo Cordeirodos Santos, Carmem S. Hara
DCC
2000
IEEE
13 years 9 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko
ICMAS
2000
13 years 11 months ago
Safe Exchange Planner
Safe exchange is a key issue in multiagent systems, especially in electronic transactions where nondelivery is a major problem. In this paper we present a unified framework for mo...
Tuomas Sandholm, Vincent Ferrandon
EDBTW
2006
Springer
13 years 12 months ago
Management of Executable Schema Mappings for XML Data Exchange
Abstract. Executable schema mappings between XML schemas are essential to support numerous data management tasks such as data exchange, data integration and schema evolution. The n...
Tadeusz Pankowski
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
13 years 10 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov