Sciweavers

20175 search results - page 146 / 4035
» Is abstraction the key to computing
Sort
View
116
Voted
CSREASAM
2006
15 years 2 months ago
Enhanced Group Key Generation Protocol
Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, th...
Sunghyuck Hong, Noé Lopez-Benitez
95
Voted
FOCS
2004
IEEE
15 years 4 months ago
Random Edge Can Be Exponential on Abstract Cubes
DGE can be exponential on abstract cubes Jir
Jirí Matousek, Tibor Szabó
67
Voted
ENTCS
2002
66views more  ENTCS 2002»
15 years 19 days ago
Unique, guarded fixed points in an additive setting: Extended Abstract
Abstract Stephen L. Bloom Department of Computer Science Stevens Institute of Technology Hoboken, NJ 07030 and Zolt
Stephen L. Bloom, Zoltán Ésik
76
Voted
FCT
2001
Springer
15 years 5 months ago
Dense Families and Key Functions of Database Relation Instances
In this paper dense families of database relations are introduced. We characterize dependencies and keys of relation instances in terms of dense families. Key functions are also in...
Jouni Järvinen
96
Voted
COMPSAC
2000
IEEE
15 years 5 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...