Sciweavers

2386 search results - page 99 / 478
» Database Security 2000
Sort
View
KYOTODL
2000
74views more  KYOTODL 2000»
14 years 11 months ago
On Spatial Information Retrieval and Database Generalization
Spatial data are often stored in a database with the finest level of details. The problem of cartographic generalization of spatial data concerns deriving spatial data with proper...
Xiaofang Zhou, Yanchun Zhang, Sanglu Lu, Guihai Ch...
ANLP
1994
91views more  ANLP 1994»
14 years 11 months ago
Resolving Anaphora in a Portable Natural Language Front End to Databases
An analysis of the evolution of Natural Language front ends in the last three decades shows that the growth in portability brought, as a side effect, the narrowing of the provided...
Flávia A. Barros, Anne N. De Roeck
WETICE
2000
IEEE
15 years 2 months ago
Secure Self-Certified COTS
With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing nu...
Mourad Debbabi, E. Giasson, Béchir Ktari, F...
ASIACRYPT
2000
Springer
15 years 2 months ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
ASIACRYPT
2000
Springer
15 years 2 months ago
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
Abstract. We investigate several alternate characterizations of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) in a concrete security setting. By analyzing the ...
Anand Desai, Sara K. Miner