Sciweavers

632 search results - page 4 / 127
» Two Facets of Authentication
Sort
View
CORR
2002
Springer
109views Education» more  CORR 2002»
13 years 7 months ago
Sufficiently Fat Polyhedra are not 2-castable
In this note we consider the problem of manufacturing a convex polyhedral object via casting. We consider a generalization of the sand casting process where the object is manufact...
David Bremner, Alexander Golynski
ICDE
2008
IEEE
132views Database» more  ICDE 2008»
14 years 9 months ago
Merging Hierarchies Using Object Placement
The main challenge in integrating two hierarchies is determining the correspondence between the nodes and edges of each hierarchy. Traditionally, the correspondence is determined ...
Kai Zhao, Robert Ikeda, Hector Garcia-Molina
ICICS
2007
Springer
13 years 11 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
SACRYPT
2001
Springer
136views Cryptology» more  SACRYPT 2001»
13 years 12 months ago
New (Two-Track-)MAC Based on the Two Trails of RIPEMD
We present a new message authentication code. It is based on a two trail construction, which underlies the unkeyed hash function RIPEMD-160. It is in comparison with the MDx-MAC ba...
Bert den Boer, Bart Van Rompay, Bart Preneel, Joos...
PERCOM
2005
ACM
14 years 7 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong