Sciweavers

5066 search results - page 680 / 1014
» Spectra of structures and relations
Sort
View
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
15 years 11 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur
JCDL
2006
ACM
151views Education» more  JCDL 2006»
15 years 11 months ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber
ICEIS
2005
IEEE
15 years 10 months ago
Conditions for Interoperability
Abstract: Interoperability for information systems remains a challenge both at the semantic and organisational levels. The original three-level architecture for local databases nee...
B. Nick Rossiter, Michael A. Heather
BTW
2005
Springer
112views Database» more  BTW 2005»
15 years 10 months ago
Valid Updates for Persistent XML Objects
: XML has emerged as the industry standard for representing and exchanging data and is already predominant in several applications today. Business, analytic and structered data wil...
Henrike Schuhart, Volker Linnemann
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...