Sciweavers

2028 search results - page 26 / 406
» Deriving Relation Keys from XML Keys
Sort
View
JTAER
2007
104views more  JTAER 2007»
14 years 11 months ago
Key Drivers of Mobile Commerce Adoption. An Exploratory Study of Spanish Mobile Users
Despite dramatic differences between non-store shoppers were discovered, very limited research has been conducted to examine them. This paper analyses the background of M-commerce...
Enrique Bigné, Carla Ruiz-Mafé, Silv...
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 5 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
TDSC
2008
121views more  TDSC 2008»
14 years 11 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
IPCCC
2005
IEEE
15 years 5 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
PVLDB
2010
107views more  PVLDB 2010»
14 years 10 months ago
On Multi-Column Foreign Key Discovery
A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...