Sciweavers

2386 search results - page 105 / 478
» Database Security 2000
Sort
View
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
15 years 11 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
NAR
2000
121views more  NAR 2000»
14 years 9 months ago
Database of non-canonical base pairs found in known RNA structures
Atomic resolution RNA structures are being published at an increasing rate. It is common to find a modest number of non-canonical base pairs in these structures in addition to the...
Uma Nagaswamy, Neil Voss, Zhengdong Zhang, George ...
IJNSEC
2008
81views more  IJNSEC 2008»
14 years 10 months ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh
ICDE
2000
IEEE
78views Database» more  ICDE 2000»
15 years 11 months ago
MetaComm: A Meta-Directory for Telecommunications
Juliana Freire, Daniel F. Lieuwen, Joann J. Ordill...
VLDB
2000
ACM
114views Database» more  VLDB 2000»
15 years 1 months ago
The A-tree: An Index Structure for High-Dimensional Spaces Using Relative Approximation
We propose a novel index structure, A-tree (Approximation tree), for similarity search of high-dimensional data. The basic idea of the
Yasushi Sakurai, Masatoshi Yoshikawa, Shunsuke Uem...