Sciweavers

206 search results - page 9 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
FROCOS
2009
Springer
15 years 7 months ago
Combining Theories with Shared Set Operations
Motivated by applications in software verification, we explore automated reasoning about the non-disjoint combination of theories of infinitely many finite structures, where the...
Thomas Wies, Ruzica Piskac, Viktor Kuncak
117
Voted
VLDB
2005
ACM
135views Database» more  VLDB 2005»
15 years 6 months ago
Distributed Privacy Preserving Information Sharing
In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest beha...
Nan Zhang 0004, Wei Zhao
158
Voted
ESAS
2007
Springer
15 years 4 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
102
Voted
SECPERU
2006
IEEE
15 years 6 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza
97
Voted
CCGRID
2002
IEEE
15 years 5 months ago
The Internet Backplane Protocol: A Study in Resource Sharing
In this work we present the Internet Backplane Protocol (IBP), a middleware created to allow the sharing of storage resources, implemented as part of the network fabric. IBP allow...
Alessandro Bassi, Micah Beck, Graham E. Fagg, Terr...