Sciweavers

842 search results - page 96 / 169
» About the authors
Sort
View
CHES
2007
Springer
136views Cryptology» more  CHES 2007»
14 years 5 months ago
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method
The hardness of the integer factorization problem assures the security of some public-key cryptosystems including RSA, and the number field sieve method (NFS), the most efficient ...
Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
ERCIMDL
2007
Springer
115views Education» more  ERCIMDL 2007»
14 years 5 months ago
The Semantic GrowBag Algorithm: Automatically Deriving Categorization Systems
Using keyword search to find relevant objects in digital libraries often results in way too large result sets. Based on the metadata associated with such objects, the faceted sear...
Jörg Diederich, Wolf-Tilo Balke
MKM
2007
Springer
14 years 5 months ago
Narrative Structure of Mathematical Texts
Abstract. There are many styles for the narrative structure of a mathematical document. Each mathematician has its own conventions and traditions about labeling portions of texts (...
Fairouz Kamareddine, Manuel Maarek, Krzysztof Rete...
OTM
2007
Springer
14 years 5 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
POLICY
2007
Springer
14 years 5 months ago
Data-Purpose Algebra: Modeling Data Usage Policies
Data is often encumbered by restrictions on the ways in which it may be used. These restrictions on usage may be determined by statute, by contract, by custom, or by common decenc...
Chris Hanson, Tim Berners-Lee, Lalana Kagal, Geral...