Sciweavers

24 search results - page 4 / 5
» Reducing the Cost of Session Key Establishment
Sort
View
ICIP
2008
IEEE
14 years 2 months ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
CN
2007
141views more  CN 2007»
13 years 7 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
WONTO
2008
13 years 9 months ago
A Survey of Ontology Learning Procedures
Abstract. Ontologies constitute an approach for knowledge representation that can be shared establishing a shared vocabulary for different applications and are also the backbone of...
Lucas Drumond, Rosario Girardi
EUROCRYPT
2004
Springer
14 years 1 months ago
Dining Cryptographers Revisited
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by Chaum for anonymous message publication. A very attractive feature of the basic D...
Philippe Golle, Ari Juels
CLUSTER
2004
IEEE
13 years 7 months ago
Seamless Access to Decentralized Storage Services in Computational Grids via a Virtual File System
This paper describes a novel technique for establishing a virtual file system that allows data to be transferred user-transparently and on-demand across computing and storage serve...
Renato J. O. Figueiredo, Nirav H. Kapadia, Jos&eac...