Sciweavers

6300 search results - page 88 / 1260
» We have it easy, but do we have it right
Sort
View
CRYPTO
2005
Springer
137views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
A Formal Treatment of Onion Routing
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the crypto...
Jan Camenisch, Anna Lysyanskaya
CN
1998
67views more  CN 1998»
15 years 29 days ago
An Extensible Rendering Engine for XML
XML has been proposed in order to bring to the web a markup language free of the shortcomings of HTML, in particular the inextensibility of the set of valid elements (tags). Style...
Paolo Ciancarini, Alfredo Rizzi, Fabio Vitali
NJC
2006
86views more  NJC 2006»
15 years 1 months ago
Axiomatizing Binding Bigraphs
We axiomatize the congruence relation for binding bigraphs and prove that the generated theory is complete. In doing so, we define a normal form for binding bigraphs, and prove tha...
Troels Christoffer Damgaard, Lars Birkedal
INFOCOM
2005
IEEE
15 years 6 months ago
SyncScan: practical fast handoff for 802.11 infrastructure networks
Abstract— Wireless access networks scale by replicating base stations geographically and then allowing mobile clients to seamlessly “hand off” from one station to the next as...
Ishwar Ramani, Stefan Savage
CN
2007
111views more  CN 2007»
15 years 1 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...