Sciweavers

ADBIS
2006
Springer
139views Database» more  ADBIS 2006»
15 years 7 months ago
Xeek: An Efficient Method for Supporting XPath Evaluation with Relational Databases
We introduce Xeek, a method for managing XML documents using relational databases. Most previous proposals in which the XPath axes are evaluated using only the pre- and postorder n...
Olli Luoma
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 7 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
15 years 7 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
ACCV
2006
Springer
15 years 7 months ago
Separation of Reflection and Transparency Using Epipolar Plane Image Analysis
The effect of reflection and transparency is superimposed in many real world scenes, which is caused by glass-like shiny and transparent materials. The presence of such incidental ...
Thanda Oo, Hiroshi Kawasaki, Yutaka Ohsawa, Katsus...
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner