-
1
-
-
84948986458
-
-
M. Bellare, P. Rogaway, Optimal asymmetric encryption, in: EUROCRYPT, 1994, pp. 92-111
-
M. Bellare, P. Rogaway, Optimal asymmetric encryption, in: EUROCRYPT, 1994, pp. 92-111
-
-
-
-
2
-
-
35248875364
-
A java middleware for guaranteeing privacy of distributed tuple spaces
-
Proc. of FIDJI'02, Int. Workshop on Scientific Engineering of Distributed Java Applications. Guelfi N., Astesiano E., and Reggio G. (Eds), Springer
-
Bettini L., and De Nicola R. A java middleware for guaranteeing privacy of distributed tuple spaces. Proc. of FIDJI'02, Int. Workshop on Scientific Engineering of Distributed Java Applications. In: Guelfi N., Astesiano E., and Reggio G. (Eds). LNCS vol. 2604 (2003), Springer 175-184
-
(2003)
LNCS
, vol.2604
, pp. 175-184
-
-
Bettini, L.1
De Nicola, R.2
-
3
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, M. Strauss, Divertible protocols and atomic proxy cryptography, in: In EUROCRYPT, 1998, pp. 127-144
-
(1998)
In EUROCRYPT
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
38349037590
-
Programming wireless sensor networks with the TeenyLIME middleware
-
Newport Beach, CA, USA, November 26-30
-
P. Costa, L. Mottola, A.L. Murphy, G.P. Picco, Programming wireless sensor networks with the TeenyLIME middleware, in: Proceedings of the 8th ACM/IFIP/USENIX International Middleware Conference, Middleware 2007, Newport Beach, CA, USA, November 26-30, 2007
-
(2007)
Proceedings of the 8th ACM/IFIP/USENIX International Middleware Conference, Middleware
-
-
Costa, P.1
Mottola, L.2
Murphy, A.L.3
Picco, G.P.4
-
5
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Alexxandria, VA, USA, October
-
R. Curtmola, J.A. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: Improved definitions and efficient constructions, in: Proceeding of the 13th ACM Conference on Computer and Communications Security, Alexxandria, VA, USA, October 2006, pp. 79-88
-
(2006)
Proceeding of the 13th ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Elgamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 4 (1985) 469-472
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
7
-
-
0003400120
-
-
Addison-Wesley, Reading, MA
-
Freeman E., Hupfer S., and Arnold K. JavaSpaces, Principles, Patterns and Practice (1999), Addison-Wesley, Reading, MA
-
(1999)
JavaSpaces, Principles, Patterns and Practice
-
-
Freeman, E.1
Hupfer, S.2
Arnold, K.3
-
8
-
-
33748752036
-
Secure shared data-space coordination languages: A process algebraic survey
-
Focardi R., Lucchi R., and Zavattaro G. Secure shared data-space coordination languages: A process algebraic survey. Science of Computer Programming 63 1 (2006) 3-15
-
(2006)
Science of Computer Programming
, vol.63
, Issue.1
, pp. 3-15
-
-
Focardi, R.1
Lucchi, R.2
Zavattaro, G.3
-
9
-
-
27944450146
-
Rapid development and flexible deployment of adaptive wireless sensor network applications
-
Columbus, Ohio, June 6-10
-
C. Fok, G. Roman, C. Lu, Rapid development and flexible deployment of adaptive wireless sensor network applications, in: Proceedings of the 24th International Conference on Distributed Computing Systems, ICDCS'05, Columbus, Ohio, June 6-10, 2005, pp. 653-662
-
(2005)
Proceedings of the 24th International Conference on Distributed Computing Systems, ICDCS'05
, pp. 653-662
-
-
Fok, C.1
Roman, G.2
Lu, C.3
-
10
-
-
84880853825
-
Rsa-oaep is secure under the rsa assumption
-
CRYPTO. Kilian J. (Ed), Springer
-
Fujisaki E., Okamoto T., Pointcheval D., and Stern J. Rsa-oaep is secure under the rsa assumption. In: Kilian J. (Ed). CRYPTO. Lecture Notes in Computer Science vol. 2139 (2001), Springer 260-274
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
12
-
-
84976215953
-
Coordination languages and their significance
-
Gelernter D., and Carriero N. Coordination languages and their significance. Communications of ACM 35 2 (1992) 96-107
-
(1992)
Communications of ACM
, vol.35
, Issue.2
, pp. 96-107
-
-
Gelernter, D.1
Carriero, N.2
-
15
-
-
18944382846
-
Secure sharing of tuple space in ad hoc settings
-
Focardi R., and Zavattaro G. (Eds), Elsevier
-
Handorean R., and Roman G.C. Secure sharing of tuple space in ad hoc settings. In: Focardi R., and Zavattaro G. (Eds). Electronic Notes in Theoretical Computer Science (2003), Elsevier
-
(2003)
Electronic Notes in Theoretical Computer Science
-
-
Handorean, R.1
Roman, G.C.2
-
16
-
-
57949106557
-
Proxy cryptography revisited
-
The Internet Society
-
Ivan A.A., and Dodis Y. Proxy cryptography revisited. NDSS (2003), The Internet Society
-
(2003)
NDSS
-
-
Ivan, A.A.1
Dodis, Y.2
-
17
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Baltimore, MD
-
H. Pang, A. Jain, K. Ramamritham, K. Tan, Verifying completeness of relational query results in data publishing, in: Proceeding of the 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, MD, 2005, pp. 407-418
-
(2005)
Proceeding of the 2005 ACM SIGMOD International Conference on Management of Data
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
18
-
-
0032667375
-
Lime: Linda meets mobility
-
Garlan D., and Kramer J. (Eds). ICSE'99, ACM Press, Los Angeles, USA
-
Picco G.P., Murphy A.L., and Roman G.-C. Lime: Linda meets mobility. In: Garlan D., and Kramer J. (Eds). Proc. 21st Int'l Conf. on Software Engineering. ICSE'99 (1999), ACM Press, Los Angeles, USA 368-377
-
(1999)
Proc. 21st Int'l Conf. on Software Engineering
, pp. 368-377
-
-
Picco, G.P.1
Murphy, A.L.2
Roman, G.-C.3
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L.M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 2 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
20
-
-
84956988269
-
Run-time system for WCL
-
Internet Programming Languages. Bal H., Belkhouche B., and Cardelli L. (Eds), Springer-Verlag
-
Rowstron A., and Wray S. Run-time system for WCL. In: Bal H., Belkhouche B., and Cardelli L. (Eds). Internet Programming Languages. LNCS vol. 1968 (1999), Springer-Verlag 78-96
-
(1999)
LNCS
, vol.1968
, pp. 78-96
-
-
Rowstron, A.1
Wray, S.2
-
23
-
-
24644483341
-
Coordination with Multicapabilities
-
Proc. 7th Int'l Conf. on Coordination Models and Languages, Coordination 2005. Jacquet J.-M., and Picco G.P. (Eds), Springer-Verlag, Berlin
-
Udizir N., Wood A., and Jacob J. Coordination with Multicapabilities. Proc. 7th Int'l Conf. on Coordination Models and Languages, Coordination 2005. In: Jacquet J.-M., and Picco G.P. (Eds). LNCS vol. 3454 (2005), Springer-Verlag, Berlin 79-93
-
(2005)
LNCS
, vol.3454
, pp. 79-93
-
-
Udizir, N.1
Wood, A.2
Jacob, J.3
-
24
-
-
0037210075
-
Coordinating processes with secure spaces
-
Proc. of Conf. on Coordination Models and Languages
-
Vitek J., Bryce C., and Oriol M. Coordinating processes with secure spaces. Proc. of Conf. on Coordination Models and Languages. Science of Computer Programming vol. 46 (2003) 163-193
-
(2003)
Science of Computer Programming
, vol.46
, pp. 163-193
-
-
Vitek, J.1
Bryce, C.2
Oriol, M.3
-
25
-
-
84957544432
-
Coordination with attributes
-
Proc. of Coordination Languages and Models, Springer-Verlag, Berlin, Heidelberg
-
Wood A. Coordination with attributes. Proc. of Coordination Languages and Models. LNCS vol. 1594 (1999), Springer-Verlag, Berlin, Heidelberg 21-36
-
(1999)
LNCS
, vol.1594
, pp. 21-36
-
-
Wood, A.1
|