Sciweavers

3731 search results - page 710 / 747
» cases 2006
Sort
View
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
111
Voted
DASFAA
2006
IEEE
153views Database» more  DASFAA 2006»
15 years 4 months ago
Dissemination of Dynamic Data: Semantics, Algorithms, and Performance
Abstract The Internet and the Web are increasingly used to disseminate fast changing data such as sensor data, traffic and weather information, stock prices, sports scores, and eve...
Krithi Ramamritham
117
Voted
DATE
2006
IEEE
114views Hardware» more  DATE 2006»
15 years 4 months ago
Compositional, efficient caches for a chip multi-processor
In current multi-media systems major parts of the functionality consist of software tasks executed on a set of concurrently operating processors. Those tasks interfere with each o...
Anca Mariana Molnos, Marc J. M. Heijligers, Sorin ...
85
Voted
DCOSS
2006
Springer
15 years 4 months ago
Distance-Sensitive Information Brokerage in Sensor Networks
In a sensor network information from multiple nodes must usually be aggregated in order to accomplish a certain task. A natural way to view this information gathering is in terms o...
Stefan Funke, Leonidas J. Guibas, An Nguyen, Yusu ...