Sciweavers

620 search results - page 46 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
BPM
2005
Springer
112views Business» more  BPM 2005»
15 years 3 months ago
Supporting Business Experts in the Design of B2B Transactions Through Interactive Process Simulation
: The paper presents a toolkit for the design and the interactive validation of message-based document exchange within the context of multi-partner electronic business transactions...
Michael Schmitt, Christophe Incoul, Eric Dubois
CPHYSICS
2007
91views more  CPHYSICS 2007»
14 years 9 months ago
Characteristics of networks in financial markets
We investigate the financial network of the Korea Stock Exchange (KSE) using numerical simulations and scaling arguments. The frequency of degree and the edge density for a real ...
Kyungsik Kim, Soo Yong Kim, Deock-Ho Ha
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
CCS
2003
ACM
15 years 1 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
PODS
2010
ACM
242views Database» more  PODS 2010»
15 years 2 months ago
Certain answers for XML queries
The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
Claire David, Leonid Libkin, Filip Murlak