Sciweavers

610 search results - page 47 / 122
» Predicate-Based Key Exchange
Sort
View
AIMS
2010
Springer
14 years 1 months ago
On the Combined Behavior of Autonomous Resource Management Agents
Abstract. A central issue in autonomic management is how to coordinate several autonomic management processes, which is assumed to require significant knowledge exchange. This stu...
Siri Fagernes, Alva L. Couch
SEKE
2007
Springer
14 years 2 months ago
A Semantical Change Detection Algorithm for XML
XML diff algorithms proposed in the literature have focused on the structural analysis of the document. When XML is used for data exchange, or when different versions of a documen...
Rodrigo Cordeirodos Santos, Carmem S. Hara
DCC
2000
IEEE
13 years 8 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko
DAGM
2003
Springer
14 years 2 months ago
Image Sequence Analysis in Environmental and Live Sciences
Image sequence processing techniques are essential to study dynamical processes such as exchange, growth, and transport processes. In this survey paper, a generalized framework for...
Bernd Jähne
FC
2001
Springer
94views Cryptology» more  FC 2001»
14 years 1 months ago
Mutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical imp...
Markus Jakobsson, David Pointcheval