Sciweavers

2028 search results - page 5 / 406
» Deriving Relation Keys from XML Keys
Sort
View
70
Voted
IS
2006
14 years 9 months ago
Answering content and structure-based queries on XML documents using relevance propagation
As XML documents contain both content and structure information, taking advantage of the document structure in the retrieval process can lead to better identify relevant informati...
Karen Sauvagnat, Mohand Boughanem, Claude Chrismen...
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 4 months ago
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Abstract. In the paper “Stronger Security of Authenticated Key Exchange” [1,2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model i...
Cas J. F. Cremers
129
Voted
EUROCRYPT
1999
Springer
15 years 1 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
ASIACRYPT
2003
Springer
15 years 1 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
EUROCRYPT
2003
Springer
15 years 2 months ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno