Sciweavers

442 search results - page 5 / 89
» A New Type of Image-Based Key
Sort
View
ENTCS
2002
66views more  ENTCS 2002»
13 years 7 months ago
Strongly Normalising Cut-Elimination with Strict Intersection Types
This paper defines reduction on derivations in the strict intersection type assignment system of [2], by generalising cut-elimination, and shows a strong normalisation result for ...
Steffen van Bakel
21
Voted
DBSEC
2010
137views Database» more  DBSEC 2010»
13 years 8 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
CHI
1996
ACM
13 years 11 months ago
SHK: Single Hand Key Card for Mobile Devices
A new input unit for mobile devices is discussed. High speed text input through touch typing and mouse data input is possible through an SHK: Single Hand Key card, "castanets...
Masakatsu Sugimoto, Kimiyo Takahashi
EUROCRYPT
2005
Springer
14 years 28 days ago
Partial Key Exposure Attacks on RSA up to Full Size Exponents
We present several attacks on RSA that factor the modulus in polynomial time under the condition that a fraction of the most significant bits or least significant bits of the pri...
Matthias Ernst, Ellen Jochemsz, Alexander May, Ben...
BIRTHDAY
2004
Springer
14 years 25 days ago
Pure Type Systems in Rewriting Logic: Specifying Typed Higher-Order Languages in a First-Order Logical Framework
Abstract. The logical and operational aspects of rewriting logic as a logical framework are tested and illustrated in detail by representing pure type systems as object logics. Mor...
Mark-Oliver Stehr, José Meseguer