Sciweavers

20175 search results - page 89 / 4035
» Is abstraction the key to computing
Sort
View
80
Voted
CIS
2005
Springer
15 years 6 months ago
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks
Jin Wook Byun, Dong Hoon Lee, Jongin Lim
110
Voted
FOSSACS
2004
Springer
15 years 6 months ago
Angelic Semantics of Fine-Grained Concurrency
We introduce a game model for an Algol-like programming language with primitives for parallel composition and synchronization on semaphores. The semantics is based on a simplifie...
Dan R. Ghica, Andrzej S. Murawski
105
Voted
ICDT
2007
ACM
105views Database» more  ICDT 2007»
15 years 4 months ago
Unlocking Keys for XML Trees
Abstract. We review key constraints in the context of XML as introduced by Buneman et al. We show that one of the proposed inference rules is not sound in general, and the axiomati...
Sven Hartmann, Sebastian Link
AMC
2005
218views more  AMC 2005»
15 years 17 days ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
112
Voted
MOBICOM
2004
ACM
15 years 6 months ago
MobiDesk: mobile virtual desktop computing
We present MobiDesk, a mobile virtual desktop computing hosting infrastructure that leverages continued improvements in network speed, cost, and ubiquity to address the complexity...
Ricardo A. Baratto, Shaya Potter, Gong Su, Jason N...