Sciweavers

2028 search results - page 8 / 406
» Deriving Relation Keys from XML Keys
Sort
View
DRM
2003
Springer
15 years 4 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
CRYPTO
1997
Springer
207views Cryptology» more  CRYPTO 1997»
15 years 3 months ago
Public-Key Cryptosystems from Lattice Reduction Problems
We present a new proposal for a trapdoor one-way function, from which we derive public-key encryption and digital signatures. The security of the new construction is based on the ...
Oded Goldreich, Shafi Goldwasser, Shai Halevi
IACR
2011
85views more  IACR 2011»
13 years 11 months ago
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revis...
Martin Ågren
104
Voted
JODL
2007
109views more  JODL 2007»
14 years 11 months ago
Examining topic shifts in content-oriented XML retrieval
Abstract. Content-oriented XML retrieval systems support access to XML repositories by retrieving, in response to user queries, XML document components (XML elements) instead of wh...
Elham Ashoori, Mounia Lalmas, Theodora Tsikrika
VLDB
2005
ACM
185views Database» more  VLDB 2005»
15 years 12 months ago
Storing and querying XML data using denormalized relational databases
XML database systems emerge as a result of the acceptance of the XML data model. Recent works have followed the promising approach of building XML database management systems on un...
Andrey Balmin, Yannis Papakonstantinou