Sciweavers

1186 search results - page 12 / 238
» A New Approach to Secure Logging
Sort
View
USS
2008
13 years 10 months ago
Replayable Voting Machine Audit Logs
Audit logs are an important tool for post-election investigations, in the event of an election dispute or problem. We propose a new approach to logging that is designed to provide...
Arel Cordero, David Wagner
ACL
2000
13 years 9 months ago
Lexicalized Stochastic Modeling of Constraint-Based Grammars using Log-Linear Measures and EM Training
We present a new approach to stochastic modeling of constraintbased grammars that is based on loglinear models and uses EM for estimation from unannotated data. The techniques are...
Stefan Riezler, Detlef Prescher, Jonas Kuhn, Mark ...
ACSAC
2009
IEEE
14 years 3 months ago
A New Approach for Anonymous Password Authentication
—Anonymous password authentication reinforces password authentication with the protection of user privacy. Considering the increasing concern of individual privacy nowadays, anon...
Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao
ASIACRYPT
2004
Springer
14 years 1 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
CP
2007
Springer
14 years 2 months ago
The Log-Support Encoding of CSP into SAT
It is known that Constraint Satisfaction Problems (CSP) can be converted into Boolean Satisfiability problems (SAT); however how to encode a CSP into a SAT problem such that a SAT...
Marco Gavanelli