Sciweavers

8228 search results - page 1297 / 1646
» Structural Logical Relations
Sort
View
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
15 years 11 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur
JCDL
2006
ACM
151views Education» more  JCDL 2006»
15 years 11 months ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber
BTW
2005
Springer
112views Database» more  BTW 2005»
15 years 11 months ago
Valid Updates for Persistent XML Objects
: XML has emerged as the industry standard for representing and exchanging data and is already predominant in several applications today. Business, analytic and structered data wil...
Henrike Schuhart, Volker Linnemann
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
15 years 11 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
MM
2004
ACM
192views Multimedia» more  MM 2004»
15 years 10 months ago
Communicating everyday experiences
In this paper, we present our approach to the problem of communicating everyday experiences. This is a challenging problem, since media from everyday events are unstructured, and ...
Preetha Appan, Hari Sundaram, David Birchfield
« Prev « First page 1297 / 1646 Last » Next »