Sciweavers

173 search results - page 31 / 35
» Efficient One-Round Key Exchange in the Standard Model
Sort
View
DEBU
2010
127views more  DEBU 2010»
14 years 7 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
CCS
2010
ACM
14 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
IJCAI
2003
14 years 11 months ago
Spaces of Theories with Ideal Refinement Operators
Refinement operators for theories avoid the problems related to the myopia of many relational learning algorithms based on the operators that refine single clauses. However, the n...
Nicola Fanizzi, Stefano Ferilli, Nicola Di Mauro, ...
ICIP
1998
IEEE
15 years 11 months ago
Adaptive Wavelet Packet Image Coding using an Estimation-Quantization Framework
In this paper, we extend the statistical model-based Estimation-Quantization (EQ) wavelet image coding algorithm introduced in [?] to include an adaptive transform component. For ...
Kannan Ramchandran, Mehmet Kivanç Mih&ccedi...
ISW
2004
Springer
15 years 2 months ago
Survey on the Technological Aspects of Digital Rights Management
Abstract. Digitalization of content is both a blessing and a curse. While it allows for efficient transmission and consumption, the ease of copying and sharing digital content has ...
William Ku, Chi-Hung Chi