Sciweavers

610 search results - page 27 / 122
» Predicate-Based Key Exchange
Sort
View
ICMAS
2000
13 years 9 months ago
Safe Exchange Planner
Safe exchange is a key issue in multiagent systems, especially in electronic transactions where nondelivery is a major problem. In this paper we present a unified framework for mo...
Tuomas Sandholm, Vincent Ferrandon
EDBTW
2006
Springer
13 years 9 months ago
Management of Executable Schema Mappings for XML Data Exchange
Abstract. Executable schema mappings between XML schemas are essential to support numerous data management tasks such as data exchange, data integration and schema evolution. The n...
Tadeusz Pankowski
ISMIR
2005
Springer
156views Music» more  ISMIR 2005»
14 years 1 months ago
The 2005 Music Information retrieval Evaluation Exchange (MIREX 2005): Preliminary Overview
er is an extended abstract which provides a brief preliminary overview of the 2005 Music Information Retrieval Evaluation eXchange (MIREX 2005). The MIREX organizational framework...
J. Stephen Downie, Kris West, Andreas F. Ehmann, E...
SPW
2004
Springer
14 years 26 days ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander
CEC
2008
IEEE
14 years 2 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...