Sciweavers

135 search results - page 19 / 27
» Attribute-based signature and its applications
Sort
View
PODS
2000
ACM
179views Database» more  PODS 2000»
15 years 2 months ago
Selectivity Estimation for Boolean Queries
In a variety of applications ranging from optimizing queries on alphanumeric attributes to providing approximate counts of documents containing several query terms, there is an in...
Zhiyuan Chen, Flip Korn, Nick Koudas, S. Muthukris...
62
Voted
ACSAC
1999
IEEE
15 years 2 months ago
Non-repudiation Evidence Generation for CORBA using XML
This paper focuses on the provision of a nonrepudiation service for CORBA. The current OMG specification of a CORBA non-repudiation service forces the programmer to augment the ap...
Michael Wichert, David B. Ingham, Steve J. Caughey
ACSAC
2000
IEEE
15 years 2 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
81
Voted
ITP
2010
159views Mathematics» more  ITP 2010»
15 years 1 months ago
Programming Language Techniques for Cryptographic Proofs
CertiCrypt is a general framework to certify the security of cryptographic primitives in the Coq proof assistant. CertiCrypt adopts the code-based paradigm, in which the statement ...
Gilles Barthe, Benjamin Grégoire, Santiago ...
76
Voted
CCS
2006
ACM
15 years 1 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk