Sciweavers

117 search results - page 10 / 24
» A Comparison of Cryptography Courses
Sort
View
EUROCRYPT
1997
Springer
13 years 11 months ago
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when no...
Eric R. Verheul, Henk C. A. van Tilborg
BROADNETS
2005
IEEE
14 years 1 months ago
Performance comparison of agile optical network architectures with static vs. dynamic regenerator assignment
Abstract— Agile all optical cross-connect (OXC) switches currently use an architecture in which regenerators and transceivers have pre-assigned and fixed directionality. However...
Kotikalapudi Sriram, David W. Griffith, Giuseppe D...
MSWIM
2004
ACM
14 years 25 days ago
Outdoor experimental comparison of four ad hoc routing algorithms
Most comparisons of wireless ad hoc routing algorithms involve simulated or indoor trial runs, or outdoor runs with only a small number of nodes, potentially leading to an incorre...
Robert S. Gray, David Kotz, Calvin C. Newport, Nik...
DEPCOS
2008
IEEE
156views Hardware» more  DEPCOS 2008»
14 years 1 months ago
A True Random Number Generator with Built-in Attack Detection
True random number generators (TRNGs) are extensively used in cryptography, simulations and statistics. Metastability is a way to generate true random numbers. By using electromag...
Bernhard Fechner, Andre Osterloh
HIP
2005
Springer
174views Cryptology» more  HIP 2005»
14 years 28 days ago
Collaborative Filtering CAPTCHAs
Abstract. Current CAPTCHAs require users to solve objective questions such as text recognition or image recognition. We propose a class of CAPTCHAs based on collaborative filterin...
Monica Chew, J. D. Tygar