Sciweavers

849 search results - page 33 / 170
» Completely Non-malleable Schemes
Sort
View
SIGMOD
2009
ACM
214views Database» more  SIGMOD 2009»
15 years 10 months ago
DDE: from dewey to a fully dynamic XML labeling scheme
Labeling schemes lie at the core of query processing for many XML database management systems. Designing labeling schemes for dynamic XML documents is an important problem that ha...
Liang Xu, Tok Wang Ling, Huayu Wu, Zhifeng Bao
85
Voted
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
15 years 1 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
EUROCRYPT
2010
Springer
15 years 2 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
72
Voted
IPPS
2005
IEEE
15 years 3 months ago
PReCinCt: A Scheme for Cooperative Caching in Mobile Peer-to-Peer Systems
Mobile Peer-to-Peer (MP2P) systems consist of mobile peers that collaborate with each other to complete application problems. Information sharing in such environments is a challen...
Huaping Shen, Mary Suchitha Joseph, Mohan Kumar, S...
NOMS
2000
IEEE
118views Communications» more  NOMS 2000»
15 years 2 months ago
On the enhancement of a differentiated services scheme
Simple Integrated Media Access (SIMA) is a differentiated service scheme based on drop preference bits in every packet. The basic idea of the SIMA is to maximize the exploitation ...
Runtong Zhang, Jian Ma