. exchange secrets. In
In Proceedings of the 27th IEEE Symposium on Foundations of Computer
Science, pages 162–167.
48 COMPUTER SECURITY IN THE 21 CENTURY
10. Future Work
This paper explores some issues. Cryptology Conference on Advances in Cryp-
tology table of contents, pages 1–15. Lecture Notes In Computer Science
archive.
[Boneh and Franklin, 2004] Boneh, D. and Franklin, M. (2004). Public ke...
. of investigators participating in Sequoia 2000:
Computer science researchers are affiliated with theComputer Science Division
at UC Berkeley, the Computer Science Department at UC San Diego, the
School. on
Database Systems, 1980.
[Hos90] J. M. Hosinski. Lab markets its storage system for supercomputers.
Government Computer News, 9(9):40, April 1990.
[Hov78] W. Hovis. Thecoastal-zone colorscanner...
. Simha, R., “A Microeconomic Approach to Optimal Resource Allocation in
Distributed Computer Systems,” IEEE Trans. on Computers 38(5), May 1989.
[LAMP86] Lampson, B., “Designing a Global Name Service,”. Our model is
similar to [FERG93, WALD92, MALO88] which take similar economic approaches to other computer
resource allocation problems.
In the next section, we describe the three kinds of entitie...
. Improved R-tree Using Fractals”, CS-TR-3032 , Univ. of Maryland
Institute for Advanced Computer Studies, Dept. of Computer Science, Univ. of Maryland, Feb. 1994.
[LITW80] W. Litwin, “Linear Hashing:. so.
3
Recycling Secondary Index Structures
*
Paul M. Aoki
Department of Electrical Engineering and Computer Sciences
University of California
Berkeley, CA 94720-1776
aoki@CS.Berkeley.EDU
Abstract
Se...