Sciweavers

610 search results - page 39 / 122
» Predicate-Based Key Exchange
Sort
View
SIGMOD
2010
ACM
209views Database» more  SIGMOD 2010»
14 years 11 days ago
ProgXe: progressive result generation framework for multi-criteria decision support queries
We demonstrate ProgXe, a practical approach to support MultiCriteria Decision Support (MCDS) applications that need to report results as they are being generated to enable the use...
Venkatesh Raghavan, Elke A. Rundensteiner
COMPSYSTECH
2009
13 years 5 months ago
Keeping artifacts alive: towards a knowledge management system
: The paper investigates first the role of artifacts in a cooperative work environment. It shows the different types of artifacts used in work groups. Then, it stresses the charact...
Hilda Tellioglu
SCL
2011
13 years 2 months ago
Suboptimal decentralized control over noisy communication channels
In this paper we present a technique for design of decentralized controllers for mean square stability of a large scale system with cascaded clusters of subsystems. Each subsystem...
Alireza Farhadi, N. U. Ahmed
IACR
2011
255views more  IACR 2011»
12 years 7 months ago
A Standard-Model Security Analysis of TLS-DHE
TLS is the most important cryptographic protocol in use today. However, up to now there is no complete cryptographic security proof in the standard model, nor in any other model. ...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...
ASIACRYPT
2003
Springer
13 years 11 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson