Sciweavers

173 search results - page 14 / 35
» Efficient One-Round Key Exchange in the Standard Model
Sort
View
MOBIMEDIA
2007
14 years 11 months ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...
IEE
2007
54views more  IEE 2007»
14 years 9 months ago
WebML modelling in UML
: In recent years, we have witnessed how the Web Engineering community has started using the standard unified modelling language (UML) notation, techniques and supporting tools fo...
Nathalie Moreno, Piero Fraternali, Antonio Valleci...
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
ICEIS
2005
IEEE
15 years 3 months ago
Change Detection and Maintenance of an XML Web Warehouse
The World Wide Web contains a huge and increasing volume of information. The web warehouse is an efficient and effective means to facilitate utilization of information on the Web,...
Ching-Ming Chao
UAI
2008
14 years 11 months ago
Cumulative distribution networks and the derivative-sum-product algorithm
We introduce a new type of graphical model called a `cumulative distribution network' (CDN), which expresses a joint cumulative distribution as a product of local functions. ...
Jim C. Huang, Brendan J. Frey