Sciweavers

610 search results - page 32 / 122
» Predicate-Based Key Exchange
Sort
View
149
Voted
PVLDB
2010
96views more  PVLDB 2010»
15 years 3 months ago
Scalable Data Exchange with Functional Dependencies
The recent literature has provided a solid theoretical foundation for the use of schema mappings in data-exchange applications. Following this formalization, new algorithms have b...
Bruno Marnette, Giansalvatore Mecca, Paolo Papotti
ACISP
1998
Springer
15 years 9 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...
IADIS
2003
15 years 6 months ago
A New Key Distribution Scheme for Secure Multicast Communications
In this short paper, we propose a new key management architecture for Multicast communications. This architecture combines the complementary variable approach with hashed keys and...
Martin St-Amand, Boucif Amar Bansaber, Dominique S...
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
15 years 10 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
15 years 11 months ago
Information Quality as a Common Ground for Key Players in e-Government Integration and Interoperability
Whereas computer-supported sharing of information is a core issue of e-Government integration and interoperation, the key players involved hardly find any guidance how to settle f...
Ralf Klischewski, Hans Jochen Scholl