Sciweavers

377 search results - page 15 / 76
» Factoring by Electronic Mail
Sort
View
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
14 years 24 days ago
Modeling the User Acceptance of E-Mail
The Technology Acceptance Model (TAM) predicts whether users will ultimately use software applications based upon causal relationships among belief and attitudinal constructs that...
Geoffrey S. Hubona, Andrew Burton-Jones
FSTTCS
2003
Springer
14 years 22 days ago
Moderately Hard Functions: From Complexity to Spam Fighting
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
Moni Naor
CEC
2003
IEEE
13 years 11 months ago
Increasing the accuracy of a spam-detecting artificial immune system
AbstractSpam, the electronic equivalent of junk mail, affects over 600 million users worldwide. Even as anti-spam solutions change to limit the amount of spam sent to users, the se...
Terri Oda, Tony White
ANNALS
2008
78views more  ANNALS 2008»
13 years 7 months ago
Netlib and NA-Net: Building a Scientific Computing Community
The Netlib software repository was created in 1984 to facilitate quick distribution of public domain software routines for use in scientific computation. The Numerical Analysis Ne...
Jack Dongarra, Gene H. Golub, Eric Grosse, Cleve B...
CCR
2000
78views more  CCR 2000»
13 years 7 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas