Sciweavers

2028 search results - page 25 / 406
» Deriving Relation Keys from XML Keys
Sort
View
107
Voted
EGOV
2010
Springer
14 years 10 months ago
Information Strategies for Open Government: Challenges and Prospects for Deriving Public Value from Government Transparency
Information-based strategies to promote open government offer many opportunities to generate social and economic value through public use of government information. Public and poli...
Sharon S. Dawes, Natalie Helbig
JCSS
2006
102views more  JCSS 2006»
14 years 11 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
FC
2010
Springer
181views Cryptology» more  FC 2010»
15 years 3 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
CCS
2008
ACM
15 years 1 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
ICDAR
2003
IEEE
15 years 5 months ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst