Sciweavers

53 search results - page 8 / 11
» Ideal Address Translation: Principles, Properties, and Appli...
Sort
View
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 7 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
SIGMOD
2011
ACM
297views Database» more  SIGMOD 2011»
14 years 2 months ago
Apples and oranges: a comparison of RDF benchmarks and real RDF datasets
The widespread adoption of the Resource Description Framework (RDF) for the representation of both open web and enterprise data is the driving force behind the increasing research...
Songyun Duan, Anastasios Kementsietsidis, Kavitha ...
JNW
2007
149views more  JNW 2007»
14 years 11 months ago
Adaptive Semantic Middleware for Mobile Environments
— Context-awareness is considered a key driving principle for the design and provisioning of adaptable pervasive services. Rightfully describing and interpreting context, however...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
CSFW
2012
IEEE
13 years 2 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
OOPSLA
2004
Springer
15 years 5 months ago
Resolving feature convolution in middleware systems
Middleware provides simplicity and uniformity for the development of distributed applications. However, the modularity of the architecture of middleware is starting to disintegrat...
Charles Zhang, Hans-Arno Jacobsen