Sciweavers

14850 search results - page 2896 / 2970
» The Security of
Sort
View
HPDC
1996
IEEE
14 years 2 months ago
Legion - A View from 50, 000 Feet
' The coming of giga-bit networks makes possible the realization ofa single nationwide virtual computer comprised of a variety of geographically distributed highpe6ormance mac...
Andrew S. Grimshaw, William A. Wulf
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 2 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
VLDB
1994
ACM
84views Database» more  VLDB 1994»
14 years 2 months ago
A Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and tr...
Ada Wai-Chee Fu, David Wai-Lok Cheung
EUROCRYPT
1990
Springer
14 years 2 months ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
AGTIVE
2007
Springer
14 years 2 months ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe
« Prev « First page 2896 / 2970 Last » Next »