Sciweavers

610 search results - page 33 / 122
» Predicate-Based Key Exchange
Sort
View
150
Voted
CIS
2005
Springer
15 years 11 months ago
On the Security of Some Password-Based Key Agreement Schemes
In this paper we show that two potential security vulnerabilities exist in the strong password-only authenticated key exchange scheme due to Jablon. Two standardised schemes based...
Qiang Tang, Chris J. Mitchell
180
Voted
IH
2009
Springer
15 years 12 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
ICDT
2007
ACM
133views Database» more  ICDT 2007»
15 years 11 months ago
XML Schema Mappings in the Presence of Key Constraints and Value Dependencies
Abstract. Schema mappings play a central role in both data integration and data exchange, and are understood as high-level specifications describing the relationships between data...
Tadeusz Pankowski, Jolanta Cybulka, Adam Meissner
INTERACT
2003
15 years 6 months ago
Key Functionalities of SAP Community
: The SAP Community is a platform for a true virtual community where people and companies come together to exchange ideas, solve problems, benefit from stimulating advice, and coll...
Raimund Mollenhauer
AAAI
1996
15 years 6 months ago
Nearly Monotonic Problems: A Key to Effective FA/C Distributed Sensor Interpretation?
The fesractioncslly-Qcczdrrcate, cooperative (FA/C) distributed problem-solving paradigm is one approach for organizing distributed problem solving among homogeneous, cooperating ...
Norman Carver, Victor R. Lesser, Robert Whitehair