Sciweavers

374 search results - page 46 / 75
» Rights Protection for Relational Data
Sort
View
ICC
2007
IEEE
154views Communications» more  ICC 2007»
14 years 3 months ago
A Policy-Based Approach for Managing Ubiquitous Networks in Urban Spaces
— Modern cities are becoming increasingly networked Network Operator and the Service Providers can introduce environments and a plethora of computing equipment interacts their ow...
Antonis M. Hadjiantonis, Marinos Charalambides, Ge...
WSC
2007
13 years 11 months ago
Clinic: correlated inputs in an automotive paint shop fire risk simulation
General Motors (GM) has developed a first proof-ofconcept simulation model to explore impacts of various fire events in automotive paint shop operations. The approach uses a chron...
Debra A. Elkins, A. Christine LaFleur, Earnest Fos...
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
14 years 2 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
APWEB
2004
Springer
14 years 2 months ago
Multiresolution Spatial Databases: Making Web-Based Spatial Applications Faster
Abstract. Spatial data has now been used extensively in the Web environment, providing online customized maps and supporting map-based applications. The full potential of Web-based...
Xiaofang Zhou, Sham Prasher, Sai Sun, Kai Xu 0003