Sciweavers

24529 search results - page 425 / 4906
» Computing on Authenticated Data
Sort
View
NDSS
2007
IEEE
15 years 11 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
EGC
2005
Springer
15 years 10 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...
NDSS
2000
IEEE
15 years 9 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
ISCI
2008
67views more  ISCI 2008»
15 years 4 months ago
A multiview approach for intelligent data analysis based on data operators
Multiview intelligent data analysis explores data from different perspectives to reveal various types of structures and knowledge embedded in the data. Each view may capture a spe...
Yaohua Chen, Yiyu Yao
COMPGEOM
2005
ACM
15 years 6 months ago
The skip quadtree: a simple dynamic data structure for multidimensional data
We present a new multi-dimensional data structure, which we call the skip quadtree (for point data in R2) or the skip octree (for point data in Rd, with constant d > 2). Our da...
David Eppstein, Michael T. Goodrich, Jonathan Z. S...