Sciweavers

3259 search results - page 543 / 652
» A Perspective on Evolutionary Computation
Sort
View
EUROCRYPT
2004
Springer
15 years 10 months ago
Projective Coordinates Leak
Denoting by P = [k]G the elliptic-curve double-and-add multiplication of a public base point G by a secret k, we show that allowing an adversary access to the projective representa...
David Naccache, Nigel P. Smart, Jacques Stern
HUC
2004
Springer
15 years 10 months ago
CAMP: A Magnetic Poetry Interface for End-User Programming of Capture Applications for the Home
As the trend towards technology-enriched home environments progresses, the need to enable users to create applications to suit their own lives increases. While several recent proje...
Khai N. Truong, Elaine M. Huang, Gregory D. Abowd
ISW
2004
Springer
15 years 10 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
POLICY
2004
Springer
15 years 10 months ago
A Policy Driven Approach to Email Services
The primary original design goal for email was to provide best-effort message delivery. Unfortunately, as the ever increasing uproar over SPAM demonstrates, the existing email inf...
Saket Kaushik, Paul Ammann, Duminda Wijesekera, Wi...
SEMWEB
2004
Springer
15 years 10 months ago
Contexts for the Semantic Web
A central theme of the semantic web is that programs should be able to easily aggregate data from different sources. Unfortunately, even if two sites provide their data using the ...
Ramanathan V. Guha, Rob McCool, Richard Fikes