Sciweavers

2028 search results - page 20 / 406
» Deriving Relation Keys from XML Keys
Sort
View
CSFW
1999
IEEE
15 years 4 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
ISMIR
2005
Springer
143views Music» more  ISMIR 2005»
15 years 5 months ago
Fuzzy Analysis in Pitch-Class Determination for Polyphonic Audio Key Finding
This paper presents a fuzzy analysis technique for pitch class determination that improves the accuracy of key finding from audio information. Errors in audio key finding, typical...
Ching-Hua Chuan, Elaine Chew
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 5 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin
DASFAA
2006
IEEE
111views Database» more  DASFAA 2006»
15 years 5 months ago
Holistic Schema Mappings for XML-on-RDBMS
When hosting XML information on relational backends, a mapping has to be established between the schemas of the information source and the target storage repositories. A rich body ...
Priti Patil, Jayant R. Haritsa
WICON
2008
15 years 1 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...