Sciweavers

610 search results - page 91 / 122
» Predicate-Based Key Exchange
Sort
View
CAISE
2007
Springer
14 years 1 months ago
Personalizing PageRank-Based Ranking over Distributed Collections
In distributed work environments, where users are sharing and searching resources, ensuring an appropriate ranking at remote peers is a key problem. While this issue has been inves...
Stefania Costache, Wolfgang Nejdl, Raluca Paiu
CCS
2007
ACM
14 years 1 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
CEAS
2007
Springer
14 years 1 months ago
Discovering Leadership Roles in Email Workgroups
Email is a key communication tool for collaborative workgroups. In this paper, we investigate how team leadership roles can be inferred from a collection of email messages exchang...
Vitor R. Carvalho, Wen Wu, William W. Cohen
CRYPTO
2007
Springer
105views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
In this paper we identify the (P, Q)-DDH assumption, as an extreme, powerful generalization of the Decisional Diffie-Hellman (DDH) assumption: virtually all previously proposed gen...
Emmanuel Bresson, Yassine Lakhnech, Laurent Mazar&...
ICDT
2007
ACM
185views Database» more  ICDT 2007»
14 years 1 months ago
Characterization of the Interaction of XML Functional Dependencies with DTDs
With the rise of XML as a standard model of data exchange, XML functional dependencies (XFDs) have become important to areas such as key analysis, document normalization, and data ...
Lucja Kot, Walker M. White