Sciweavers

620 search results - page 86 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
15 years 10 months ago
Non-interactive and reusable non-malleable commitment schemes
We consider non-malleable (NM) and universally composable (UC) commitment schemes in the common reference string (CRS) model. We show how to construct non-interactive NM commitmen...
Ivan Damgård, Jens Groth
VLDB
2001
ACM
126views Database» more  VLDB 2001»
15 years 10 months ago
XML-enabled workflow management for e-services across heterogeneous platforms
Advanced e-services require efficient, flexible, and easy-to-use workflow technology that integrates well with mainstream Internet technologies like XML and Web servers. This pape...
German Shegalov, Michael Gillmann, Gerhard Weikum
SIGMOD
2002
ACM
196views Database» more  SIGMOD 2002»
15 years 9 months ago
Storing and querying ordered XML using a relational database system
XML is quickly becoming the de facto standard for data exchange over the Internet. This is creating a new set of data management requirements involving XML, such as the need to st...
Igor Tatarinov, Stratis Viglas, Kevin S. Beyer, Ja...
DCC
2001
IEEE
15 years 9 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
AINA
2009
IEEE
15 years 4 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu