Sciweavers

2662 search results - page 186 / 533
» Objects-early tools: a demonstration
Sort
View
77
Voted
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
Oblivious Transfer and Linear Functions
Abstract. We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiv...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
DSOM
2006
Springer
15 years 5 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
153
Voted
E2EMON
2006
IEEE
15 years 5 months ago
Object-Relational DBMS for Packet-Level Traffic Analysis: Case Study on Performance Optimization
Analyzing Internet traffic at packet level involves generally large amounts of raw data, derived data, and results from various analysis tasks. In addition, the analysis often proc...
Matti Siekkinen, Ernst W. Biersack, Vera Goebel
EDBT
2006
ACM
91views Database» more  EDBT 2006»
15 years 5 months ago
Multi-query SQL Progress Indicators
Recently, progress indicators have been proposed for SQL queries in RDBMSs. All previously proposed progress indicators consider each query in isolation, ignoring the impact simult...
Gang Luo, Jeffrey F. Naughton, Philip S. Yu
ESORICS
2006
Springer
15 years 5 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright