Sciweavers

610 search results - page 32 / 122
» Predicate-Based Key Exchange
Sort
View
PVLDB
2010
96views more  PVLDB 2010»
13 years 6 months ago
Scalable Data Exchange with Functional Dependencies
The recent literature has provided a solid theoretical foundation for the use of schema mappings in data-exchange applications. Following this formalization, new algorithms have b...
Bruno Marnette, Giansalvatore Mecca, Paolo Papotti
ACISP
1998
Springer
13 years 11 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...
IADIS
2003
13 years 9 months ago
A New Key Distribution Scheme for Secure Multicast Communications
In this short paper, we propose a new key management architecture for Multicast communications. This architecture combines the complementary variable approach with hashed keys and...
Martin St-Amand, Boucif Amar Bansaber, Dominique S...
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
14 years 27 days ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
14 years 1 months ago
Information Quality as a Common Ground for Key Players in e-Government Integration and Interoperability
Whereas computer-supported sharing of information is a core issue of e-Government integration and interoperation, the key players involved hardly find any guidance how to settle f...
Ralf Klischewski, Hans Jochen Scholl