Sciweavers

285 search results - page 45 / 57
» Relating two formal models of path-vector routing
Sort
View
EUROCRYPT
2004
Springer
15 years 2 months ago
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexi...
Tal Malkin, Satoshi Obana, Moti Yung
SIGIR
2003
ACM
15 years 2 months ago
Evaluating different methods of estimating retrieval quality for resource selection
In a federated digital library system, it is too expensive to query every accessible library. Resource selection is the task to decide to which libraries a query should be routed....
Henrik Nottelmann, Norbert Fuhr
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 3 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
DATE
1998
IEEE
103views Hardware» more  DATE 1998»
15 years 1 months ago
Efficient Encoding Schemes for Symbolic Analysis of Petri Nets
Petri nets are a graph-based formalism appropriate to model concurrentsystems such as asynchronouscircuits or network protocols. Symbolic techniques based on Binary Decision Diagr...
Enric Pastor, Jordi Cortadella
CBMS
2006
IEEE
15 years 3 months ago
An Ontology-Driven Mediator for Querying Time-Oriented Biomedical Data
— Most biomedical research databases contain considerable amounts of time-oriented data. However, temporal knowledge about the contextual meaning of such data is not usually repr...
Martin J. O'Connor, Ravi Shankar, Amar K. Das