Sciweavers

2028 search results - page 12 / 406
» Deriving Relation Keys from XML Keys
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 7 days ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
DAC
2010
ACM
15 years 3 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
INFORMATICALT
2002
110views more  INFORMATICALT 2002»
14 years 11 months ago
Extraction of Object-oriented Schemas from Existing Relational Databases: a Form-driven Approach
In this paper, we present our Form-driven approach for reverse engineering of relationa databases. This methodology uses the information extracted from both form structure and inst...
Mimoun Malki, André Flory, Mustapha Kamal R...
CSFW
2005
IEEE
15 years 5 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
ESAS
2006
Springer
15 years 3 months ago
On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks
We derive the optimality results for key pre distribution scheme for distributed sensor networks, and relations between interesting parameters. Namely, given a key-pool of size n ...
Subhas Kumar Ghosh