Sciweavers

528 search results - page 53 / 106
» Introducing records by refactoring
Sort
View
ACNS
2010
Springer
150views Cryptology» more  ACNS 2010»
15 years 2 months ago
Regulatory Compliant Oblivious RAM
Abstract. We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data re...
Bogdan Carbunar, Radu Sion
CCS
2001
ACM
15 years 2 months ago
A new approach to DNS security (DNSSEC)
The Domain Name System (DNS) is a distributed database that allows convenient storing and retrieving of resource records. DNS has been extended to provide security services (DNSSE...
Giuseppe Ateniese, Stefan Mangard
ICPPW
1999
IEEE
15 years 2 months ago
On Dynamically Adapting Registration Areas to User Mobility Patterns in PCS Networks
Location management is an essential service in mobile networks. It provides mechanisms for recording and querying location of mobile units in the network. This is needed for estab...
Georgios Varsamopoulos, Sandeep K. S. Gupta
MFCS
1994
Springer
15 years 1 months ago
A Proof System for Asynchronously Communicating Deterministic Processes
We introduce in this paper new communication and synchronization constructs which allow deterministic processes, communicating asynchronously via unbounded FIFO bu ers, to cope wi...
Frank S. de Boer, M. van Hulst
ICASSP
2009
IEEE
15 years 1 months ago
High resolution audio synchronization using chroma onset features
The general goal of music synchronization is to automatically align the multiple information sources such as audio recordings, MIDI files, or digitized sheet music related to a gi...
Sebastian Ewert, Meinard Müller, Peter Grosch...