Sciweavers

36 search results - page 1 / 8
» A Secure Two Phase Locking Protocol
Sort
View
SRDS
1993
IEEE
13 years 9 months ago
A Secure Two Phase Locking Protocol
Rasikan David, Sang Hyuk Son
CASCON
2004
110views Education» more  CASCON 2004»
13 years 6 months ago
Investigations in tree locking for compiled database applications
We report on initial experiments in tree locking schemes for compiled database applications. Such applications have a repository style of architecture in which a collection of sof...
Heng Yu, Grant E. Weddell
VLDB
1997
ACM
84views Database» more  VLDB 1997»
13 years 9 months ago
Using Versions in Update Transactions: Application to Integrity Checking
This paper proposes an extension of the multiversion two phase locking protocol, called EMVZPL, which enables update transactions to use versions while guaranteeing the serializab...
François Llirbat, Eric Simon, Dimitri Tombr...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 5 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
ICALP
2005
Springer
13 years 10 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor