Sciweavers

1323 search results - page 131 / 265
» Updatable Security Views
Sort
View
205
Voted
GIS
2003
ACM
16 years 3 months ago
The internet spatial spreadsheet: enabling remote visualization of dynamic spatial data and ongoing query results over a network
Moving object databases store and process data for objects that change location frequently. Materialized views maintained over time must be updated to reflect changes due to the m...
Glenn S. Iwerks, Hanan Samet
116
Voted
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
15 years 7 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
CCS
2007
ACM
15 years 8 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
119
Voted
AFRICACRYPT
2009
Springer
15 years 6 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
120
Voted
IEICET
2006
108views more  IEICET 2006»
15 years 2 months ago
Plaintext Simulatability
We propose a new security class, called plaintext-simulatability, defined over the public-key encryption schemes. The notion of plaintext simulatability (denoted PS) is similar to ...
Eiichiro Fujisaki