Sciweavers

12 search results - page 3 / 3
» The Re-Representation Problem in a Logic-Based Framework for...
Sort
View
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
13 years 10 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
SIGMOD
1999
ACM
114views Database» more  SIGMOD 1999»
13 years 9 months ago
A Layered Architecture for Querying Dynamic Web Content
The design of webbases, database systems for supporting Webbased applications, is currently an active area of research. In this paper, we propose a 3-layer architecture for design...
Hasan Davulcu, Juliana Freire, Michael Kifer, I. V...