Sciweavers

610 search results - page 80 / 122
» Predicate-Based Key Exchange
Sort
View
CE
2004
88views more  CE 2004»
13 years 7 months ago
Beyond formal learning: Informal community eLearning
The goal of the study described in this paper was to gain an improved understanding of the social context of UK online centres and issues around the creation and exchange of knowl...
John Cook, Matt Smith
ADBIS
2010
Springer
203views Database» more  ADBIS 2010»
13 years 6 months ago
Detecting XML Functional Dependencies through Formal Concept Analysis
Abstract. As XML becomes a popular data representation and exchange format over the web, XML schema design has become an important research area. Formal Concept Analysis (FCA) has ...
Katalin Tunde Janosi-Rancz, Viorica Varga, Timea N...
TON
2010
158views more  TON 2010»
13 years 6 months ago
Always acyclic distributed path computation
Abstract—Distributed routing algorithms may give rise to transient loops during path recomputation, which can pose significant stability problems in high-speed networks. We pres...
Saikat Ray, Roch Guérin, Kin Wah Kwong, Rut...
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 2 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 1 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...