Sciweavers

2028 search results - page 17 / 406
» Deriving Relation Keys from XML Keys
Sort
View
WCRE
2007
IEEE
15 years 6 months ago
Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications
The software industry is increasingly confronted with the issues of understanding and maintaining a special type of object-oriented systems, namely enterprise applications. A spec...
Cristina Marinescu
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 4 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
87
Voted
ITIIS
2008
128views more  ITIIS 2008»
14 years 11 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
107
Voted
EUROCRYPT
1999
Springer
15 years 4 months ago
New Public Key Cryptosystems Based on the Dependent-RSA Problems
Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and furthermore ever well studied. However, between the efficiency of RSA and the security of...
David Pointcheval
102
Voted
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 3 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman