Sciweavers

620 search results - page 33 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
Interference-Resilient Information Exchange
—This paper presents an efficient protocol to reliably exchange information in a single-hop radio network with unpredictable interference. The devices can access C communication...
Seth Gilbert, Rachid Guerraoui, Dariusz R. Kowalsk...
AMEC
2004
Springer
15 years 3 months ago
Revenue Failures and Collusion in Combinatorial Auctions and Exchanges with VCG Payments
Abstract. In a combinatorial auction, there are multiple items for sale, and bidders are allowed to place a bid on a bundle of these items rather than just on the individual items....
Vincent Conitzer, Tuomas Sandholm
ECSCW
2007
14 years 11 months ago
Instrumental action: the timely exchange of implements during surgical operations
In this paper we analyse an apparently simple collaborative activity, that of passing an implement from one person to another. The particular case we consider is surgical operation...
Marcus Sanchez Svensson, Christian Heath, Paul Luf...
PVLDB
2010
96views more  PVLDB 2010»
14 years 8 months ago
Scalable Data Exchange with Functional Dependencies
The recent literature has provided a solid theoretical foundation for the use of schema mappings in data-exchange applications. Following this formalization, new algorithms have b...
Bruno Marnette, Giansalvatore Mecca, Paolo Papotti
ACISP
1998
Springer
15 years 2 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...