Sciweavers

442 search results - page 5 / 89
» A New Type of Image-Based Key
Sort
View
ENTCS
2002
66views more  ENTCS 2002»
15 years 3 months ago
Strongly Normalising Cut-Elimination with Strict Intersection Types
This paper defines reduction on derivations in the strict intersection type assignment system of [2], by generalising cut-elimination, and shows a strong normalisation result for ...
Steffen van Bakel
109
Voted
DBSEC
2010
137views Database» more  DBSEC 2010»
15 years 4 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
CHI
1996
ACM
15 years 7 months ago
SHK: Single Hand Key Card for Mobile Devices
A new input unit for mobile devices is discussed. High speed text input through touch typing and mouse data input is possible through an SHK: Single Hand Key card, "castanets...
Masakatsu Sugimoto, Kimiyo Takahashi
EUROCRYPT
2005
Springer
15 years 9 months ago
Partial Key Exposure Attacks on RSA up to Full Size Exponents
We present several attacks on RSA that factor the modulus in polynomial time under the condition that a fraction of the most significant bits or least significant bits of the pri...
Matthias Ernst, Ellen Jochemsz, Alexander May, Ben...
BIRTHDAY
2004
Springer
15 years 8 months ago
Pure Type Systems in Rewriting Logic: Specifying Typed Higher-Order Languages in a First-Order Logical Framework
Abstract. The logical and operational aspects of rewriting logic as a logical framework are tested and illustrated in detail by representing pure type systems as object logics. Mor...
Mark-Oliver Stehr, José Meseguer