Sciweavers

ACNS
2006
Springer
148views Cryptology» more  ACNS 2006»
15 years 8 months ago
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
Dongvu Tonien, Reihaneh Safavi-Naini
ADBIS
2004
Springer
92views Database» more  ADBIS 2004»
15 years 8 months ago
Optimal Database Locks for Efficient Integrity Checking
Abstract. In concurrent database systems, correctness of update transactions refers to the equivalent effects of the execution schedule and some serial schedule over the same set o...
Davide Martinenghi
ADBIS
2004
Springer
94views Database» more  ADBIS 2004»
15 years 8 months ago
Formalization and Detection of Events over a Sliding Window in Active Databases Using Interval-Based Semantics
Trend analysis and forecasting applications (e.g., securities trading, stock market, and after-the-fact diagnosis) need event detection along a moving time window. Event-driven app...
Raman Adaikkalavan, Sharma Chakravarthy
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 8 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
15 years 8 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova