Sciweavers

36 search results - page 3 / 8
» A Secure Two Phase Locking Protocol
Sort
View
JSS
1998
87views more  JSS 1998»
14 years 9 months ago
On using similarity for concurrency control in real-time database systems
Most of the proposed concurrency control protocols for real-time database systems (RTDBS) are based on serializability theorem. Owing to the unique characteristics of real-time da...
Kam-yiu Lam, Wai-cheong Yau
ESORICS
1994
Springer
15 years 1 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 3 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
82
Voted
ICDCN
2010
Springer
15 years 1 months ago
On Communication Complexity of Secure Message Transmission in Directed Networks
Abstract. We re-visit the problem of perfectly secure message transmission (PSMT) in a directed network under the presence of a threshold adaptive Byzantine adversary, having unbou...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
DEXA
1999
Springer
158views Database» more  DEXA 1999»
15 years 1 months ago
Transaction Shipping Approach for Mobile Distributed Real-Time Databases
Due to the unpredictability of mobile network, it is difficult to meet transaction deadlines in a mobile distributed real-time database system (MDRDTBS). We propose the idea of tra...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...