Sciweavers

173 search results - page 30 / 35
» Efficient One-Round Key Exchange in the Standard Model
Sort
View
APCSAC
2000
IEEE
15 years 1 months ago
Dataflow Java: Implicitly Parallel Java
Dataflow computation models enable simpler and more efficient management of the memory hierarchy - a key barrier to the performance of many parallel programs. This paper describes...
Gareth Lee, John Morris
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 1 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
91
Voted
EUROCRYPT
2007
Springer
15 years 3 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
WWW
2005
ACM
15 years 3 months ago
How to make web sites talk together: web service solution
Integrating web sites to provide more efficient services is a very promising way in the Internet. For example searching house for rent based on train system or preparing a holiday...
Hoang Pham Huy, Takahiro Kawamura, Tetsuo Hasegawa
SYRCODIS
2008
184views Database» more  SYRCODIS 2008»
14 years 11 months ago
Towards Cost-based Query Optimization in Native XML Database Management Systems
In the last few years, XML became a de-facto standard for the exchange of structured and semi-structured data. The database research community took this development into account b...
Andreas M. Weiner, Christian Mathis, Theo Här...