• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,043
Next 10 →

Table 1: The time required to obtain encrypted data by decrypting the whole XML document

in A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery
by Tao-ku Chang
"... In PAGE 8: ...ava Development Kit 1.4 (Sun Microsystems). The original XML document had 101 elements: a tree with one root node and its 100 child element nodes, in which each child node was associated with a text node which in turn comprised either 100 or 500 bytes. Table1 lists the times required to decrypt the whole encrypted XML document and then to query target elements. The processing time increases dramatically with the number of encrypted elements because all encrypted elements need to be decrypted first.... ..."

Table 5.1: Basic functionality annotations for naming concept responsibilities

in Revealing JAVA Class Structure with Concept Lattices
by unknown authors

Table 4. Throughput of encryption

in Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit
by Sören Rinne, Thomas Eisenbarth, Christof Paar
"... In PAGE 7: ... Though in this benchmark it achieves the lowest number of cycles for encryption and decryption of one block of data. Table4 and table 5 focus on the throughput of encryption and decryption of each cipher. Column 2 in Table 4 and Table 5 shows the block size in bytes, column 3 replicates the count of cycles from table 3.... In PAGE 7: ... Table 4 and table 5 focus on the throughput of encryption and decryption of each cipher. Column 2 in Table4 and Table 5 shows the block size in bytes, column 3 replicates the count of cycles from table 3. Column 4 is the quotient of column 3 and 2 and column 5 shows the throughput of encryption/decryption in cycles per byte.... ..."

Table 1: Encryption Methods

in unknown title
by unknown authors 2000
Cited by 21

Table 5. Encryption Information

in unknown title
by unknown authors

TABLE II ENCRYPTION TIMINGS

in
by unknown authors

Table 1 Encryption table.

in Parallel encrypted array multipliers
by M. Putrino, et al.

Table 1: Encryption Operations.

in
by unknown authors

Tables Predicates

in Exploiting Statistics on Query Expressions for Optimization
by Nicolas Bruno, et al.

Tabled Predicate

in 1 Workshop Coordinators
by Ricardo Lopes, Michel Ferreira (eds, Michel Ferreira, Ricardo Lopes (portugal, Bart Demoen (belgium, David S. Warren (usa, Enrico Pontelli (usa, Haifeng Guo (usa, Inês De Castro Dutra (brazil, Kostis Sagonas (sweden, Manuel Carro (spain, Michel Ferreira (portugal, Ricardo Lopes (portugal, Luís Lopes, Manuel Carro, Manuel Eduardo Correia, Michel Ferreira, Nikolay Pelov, Ricardo Lopes, Ricardo Rocha 2003
Next 10 →
Results 1 - 10 of 4,043
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University