Sciweavers

340 search results - page 9 / 68
» Cryptography: An Art and Science
Sort
View
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
14 years 3 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
CG
2000
Springer
13 years 9 months ago
Computer graphics curricula in the visual arts
Computers have recently emerged as commonplace on the scene in a record number of university art departments. This rapid change has created the need for new curriculum in the comp...
Dena Elisabeth Eber
SDM
2009
SIAM
180views Data Mining» more  SDM 2009»
14 years 7 months ago
Structure and Dynamics of Research Collaboration in Computer Science.
Complex systems exhibit emergent patterns of behavior at different levels of organization. Powerful network analysis methods, developed in physics and social sciences, have been s...
Andre Nash, Christian Bird, Earl T. Barr, Premkuma...
ACSC
2006
IEEE
14 years 3 months ago
On pedagogically sound examples in public-key cryptography
Pencil-and-paper exercises in public-key cryptography are important in learning the subject. It is desirable that a student doing such an exercise does not get the right answer by...
Suan Khai Chong, Graham Farr, Laura Frost, Simon H...
FOCS
2005
IEEE
14 years 3 months ago
Cryptography In the Bounded Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary’s quantum memory is of bounded size. We show that oblivious ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...