Sciweavers

610 search results - page 98 / 122
» Predicate-Based Key Exchange
Sort
View
EXPCS
2007
13 years 11 months ago
An analysis of XML compression efficiency
XML simplifies data exchange among heterogeneous computers, but it is notoriously verbose and has spawned the development of many XML-specific compressors and binary formats. We p...
Christopher J. Augeri, Dursun A. Bulutoglu, Barry ...
CASES
2004
ACM
13 years 11 months ago
Translating affine nested-loop programs to process networks
New heterogeneous multiprocessor platforms are emerging that are typically composed of loosely coupled components that exchange data using programmable interconnections. The compon...
Alexandru Turjan, Bart Kienhuis, Ed F. Deprettere
EUROCRYPT
2004
Springer
13 years 11 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
ER
2006
Springer
121views Database» more  ER 2006»
13 years 11 months ago
XBRL Taxonomies and OWL Ontologies for Investment Funds
The analysis of investment funds information requires the availability of homogeneous, both up-to-date and historical information of the funds considered, which is usually generate...
Rubén Lara, Iván Cantador, Pablo Cas...