Sciweavers

620 search results - page 79 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
CE
2004
88views more  CE 2004»
14 years 9 months ago
Beyond formal learning: Informal community eLearning
The goal of the study described in this paper was to gain an improved understanding of the social context of UK online centres and issues around the creation and exchange of knowl...
John Cook, Matt Smith
ADBIS
2010
Springer
203views Database» more  ADBIS 2010»
14 years 8 months ago
Detecting XML Functional Dependencies through Formal Concept Analysis
Abstract. As XML becomes a popular data representation and exchange format over the web, XML schema design has become an important research area. Formal Concept Analysis (FCA) has ...
Katalin Tunde Janosi-Rancz, Viorica Varga, Timea N...
TON
2010
158views more  TON 2010»
14 years 8 months ago
Always acyclic distributed path computation
Abstract—Distributed routing algorithms may give rise to transient loops during path recomputation, which can pose significant stability problems in high-speed networks. We pres...
Saikat Ray, Roch Guérin, Kin Wah Kwong, Rut...
ICC
2009
IEEE
14 years 7 months ago
Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
Abstract--In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid...
Ayan Roy Chowdhury, John S. Baras
IEEEIAS
2009
IEEE
14 years 7 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng