Sciweavers

813 search results - page 20 / 163
» Pipeline-centric provenance model
Sort
View
JBCS
2010
85views more  JBCS 2010»
13 years 2 months ago
OWL schema matching
Schema matching is a fundamental issue to many database applications, such as query mediation and data warehousing. It becomes a challenge when different vocabularies are used to r...
Luiz André P. Paes Leme, Marco A. Casanova,...
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
14 years 5 days ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
CSL
2008
Springer
13 years 9 months ago
Syntactic Metatheory of Higher-Order Subtyping
Abstract. We present a new proof of decidability of higher-order subtyping in the presence of bounded quantification. The algorithm is formulated as a judgement which operates on b...
Andreas Abel, Dulma Rodriguez
ACNS
2006
Springer
112views Cryptology» more  ACNS 2006»
14 years 1 months ago
Password Based Server Aided Key Exchange
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient t...
Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
CSSE
2008
IEEE
14 years 2 months ago
A New CSP Operator for Optional Parallelism
We introduce a new CSP operator for modeling scenarios characterised by partial or optional parallelism. We provide examples of such scenarios and sketch the semantics of our oper...
Stefan Gruner, Derrick G. Kourie, Markus Roggenbac...