Sciweavers

610 search results - page 23 / 122
» Predicate-Based Key Exchange
Sort
View
JOC
2006
67views more  JOC 2006»
13 years 7 months ago
Threshold Password-Authenticated Key Exchange
Philip D. MacKenzie, Thomas Shrimpton, Markus Jako...
SCN
2008
Springer
13 years 7 months ago
Early security key exchange for encryption in Mobile IPv6 handoff
Tin Yu Wu, Chi-Hsiang Lo, Han-Chieh Chao
CIKM
2011
Springer
12 years 7 months ago
Tractable XML data exchange via relations
We consider data exchange for XML documents: given source and target schemas, a mapping between them, and a document conforming to the source schema, construct a target document a...
Rada Chirkova, Leonid Libkin, Juan L. Reutter
SIAMJO
2010
136views more  SIAMJO 2010»
13 years 2 months ago
A New Exchange Method for Convex Semi-Infinite Programming
In this paper we propose a new exchange method for solving convex semi-infinite programming (CSIP) problems. We introduce a new dropping-rule in the proposed exchange algorithm, wh...
Liping Zhang, Soon-Yi Wu, Marco A. López
SIMPRA
2011
13 years 2 months ago
Virtual segment: Store-carry-forward relay-based support for wide-area non-real-time data exchange
—In the Internet of the future, a flexible, dynamic combination of wireless and wired access networks is expected to be a key driver for enlarging the broadband communication se...
Shinya Yamamura, Akira Nagata, Masato Tsuru, Hitom...