Sciweavers

620 search results - page 98 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
104
Voted
CASES
2004
ACM
15 years 1 months ago
Translating affine nested-loop programs to process networks
New heterogeneous multiprocessor platforms are emerging that are typically composed of loosely coupled components that exchange data using programmable interconnections. The compon...
Alexandru Turjan, Bart Kienhuis, Ed F. Deprettere
73
Voted
EUROCRYPT
2004
Springer
15 years 1 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
ER
2006
Springer
121views Database» more  ER 2006»
15 years 1 months ago
XBRL Taxonomies and OWL Ontologies for Investment Funds
The analysis of investment funds information requires the availability of homogeneous, both up-to-date and historical information of the funds considered, which is usually generate...
Rubén Lara, Iván Cantador, Pablo Cas...
EKAW
2000
Springer
15 years 1 months ago
What's in an Electronic Business Model?
An electronic business model is an important baseline for the development of e-commerce system applications. Essentially, it provides the design rationale for e-commerce systems fr...
Jaap Gordijn, Hans Akkermans, Hans van Vliet