Sciweavers

3145 search results - page 39 / 629
» Key Improvements to XTR
Sort
View
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
15 years 3 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
CICLING
2006
Springer
15 years 1 months ago
Extracting Key Phrases to Disambiguate Personal Names on the Web
Abstract. When you search for information regarding a particular person on the web, a search engine returns many pages. Some of these pages may be for people with the same name. Ho...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
ICDE
2010
IEEE
180views Database» more  ICDE 2010»
14 years 10 months ago
Adaptive indexing for relational keys
: © Adaptive indexing for relational keys Goetz Graefe, Harumi Kuno HP Laboratories HPL-2010-23 databases, indexes, storage systems, B-trees, adaptive merging, database cracking A...
Goetz Graefe, Harumi A. Kuno
JCP
2006
120views more  JCP 2006»
14 years 9 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
ICDT
2009
ACM
198views Database» more  ICDT 2009»
15 years 10 months ago
Consistent query answering under primary keys: a characterization of tractable queries
This article deals with consistent query answering to conjunctive queries under primary key constraints. The repairs of an inconsistent database db are obtained by selecting a max...
Jef Wijsen