Sciweavers

433 search results - page 16 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
HICSS
1999
IEEE
153views Biometrics» more  HICSS 1999»
13 years 11 months ago
Search Patterns in Hypertext Exhibits
As access to hypermedia documents becomes generally available, it becomes increasingly important to understand how casual users search for information. We have studied search patt...
Joan C. Nordbotten, Svein Nordbotten
EUROCRYPT
1997
Springer
13 years 11 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
CRYPTO
2005
Springer
72views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Unconditional Characterizations of Non-interactive Zero-Knowledge
Abstract. Non-interactive zero-knowledge (NIZK) proofs have been investigated in two models: the Public Parameter model and the Secret Parameter model. In the former, a public stri...
Rafael Pass, Abhi Shelat
SIGUCCS
2003
ACM
14 years 22 days ago
Leadership by design: collaborations and cornerstones
This paper chronicles the collaborative efforts of Valparaiso University’s IT department and main library over the past five years. Highlights of selected resources and services...
Trisha Mileham, Joyce E. Hicks
WAIM
2007
Springer
14 years 1 months ago
The Selection of Tunable DBMS Resources Using the Incremental/Decremental Relationship
The DBMS performance might change by allocating resources and by performing a specific kind of workload. Database administrators should be able to identify relative resources that ...
Jeong Seok Oh, Hyun Woong Shin, Sang Ho Lee