Sciweavers

20175 search results - page 114 / 4035
» Is abstraction the key to computing
Sort
View
130
Voted
OTM
2007
Springer
15 years 6 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 6 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
90
Voted
DEXA
2004
Springer
96views Database» more  DEXA 2004»
15 years 6 months ago
A Selective Key-Oriented XML Index for the Index Selection Problem in XDBMS
Abstract. In relational database management systems indexes are used to accelerate specific queries. The selection of indexes is an important task when tuning a database which is ...
Beda Christoph Hammerschmidt, Martin Kempa, Volker...
106
Voted
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
15 years 6 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
108
Voted
CICLING
2006
Springer
15 years 4 months ago
Extracting Key Phrases to Disambiguate Personal Names on the Web
Abstract. When you search for information regarding a particular person on the web, a search engine returns many pages. Some of these pages may be for people with the same name. Ho...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...