Sciweavers

610 search results - page 33 / 122
» Predicate-Based Key Exchange
Sort
View
CIS
2005
Springer
14 years 1 months ago
On the Security of Some Password-Based Key Agreement Schemes
In this paper we show that two potential security vulnerabilities exist in the strong password-only authenticated key exchange scheme due to Jablon. Two standardised schemes based...
Qiang Tang, Chris J. Mitchell
IH
2009
Springer
14 years 2 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
ICDT
2007
ACM
133views Database» more  ICDT 2007»
14 years 1 months ago
XML Schema Mappings in the Presence of Key Constraints and Value Dependencies
Abstract. Schema mappings play a central role in both data integration and data exchange, and are understood as high-level specifications describing the relationships between data...
Tadeusz Pankowski, Jolanta Cybulka, Adam Meissner
INTERACT
2003
13 years 9 months ago
Key Functionalities of SAP Community
: The SAP Community is a platform for a true virtual community where people and companies come together to exchange ideas, solve problems, benefit from stimulating advice, and coll...
Raimund Mollenhauer
AAAI
1996
13 years 9 months ago
Nearly Monotonic Problems: A Key to Effective FA/C Distributed Sensor Interpretation?
The fesractioncslly-Qcczdrrcate, cooperative (FA/C) distributed problem-solving paradigm is one approach for organizing distributed problem solving among homogeneous, cooperating ...
Norman Carver, Victor R. Lesser, Robert Whitehair