Sciweavers

620 search results - page 31 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ER
2006
Springer
132views Database» more  ER 2006»
15 years 1 months ago
Schema-Mediated Exchange of Temporal XML Data
When web servers publish data formatted in XML, only the current state of the data is (generally) published. But data evolves over time as it is updated. Capturing that evolution i...
Curtis E. Dyreson, Richard T. Snodgrass, Faiz Curr...
IJNSEC
2006
110views more  IJNSEC 2006»
14 years 10 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
CSL
2007
Springer
15 years 4 months ago
Tightening the Exchange Rates Between Automata
Automata on infinite objects were the key to the solution of several fundamental decision problems in mathematics and logic. Today, automata on infinite objects are used for form...
Orna Kupferman
ICLA
2009
Springer
15 years 4 months ago
Instantial Relevance in Polyadic Inductive Logic
Abstract. We show that under the assumptions of Spectrum Exchangeability and Language Invariance the so called Only Rule, a principle of instantial relevance previously know for un...
Jürgen Landes, Jeff B. Paris, Alena Vencovsk&...
EKAW
2000
Springer
15 years 1 months ago
OIL in a Nutshell
Currently computers are changing from single isolated devices into entry points into a worldwide network of information exchange and business transactions. Support in data, inform...
Dieter Fensel, Ian Horrocks, Frank van Harmelen, S...