Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
Constraint databases and geographic information systems share many applications. However, constraint databases can go beyond geographic information systems in efficient spatial and...
Despite a large research effort, software distributed shared memory systems have not been widely used to run parallel applications across clusters of computers. The higher perform...
Originally developed for file sharing, P2P concepts are predestinated to realize information sharing in a more general way. Combined with the well known concept of loosely coupled...
A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical chal...