Sciweavers

377 search results - page 25 / 76
» Factoring by Electronic Mail
Sort
View
HICSS
1999
IEEE
88views Biometrics» more  HICSS 1999»
13 years 12 months ago
A Cache Architecture for Modernizing the Usenet Infrastructure
Current Internet users see the combination of World-wide Web (WWW) and electronic mail as a synonym for the Internet. While WWW is excellent for easy and fast dissemination of inf...
Thomas Gschwind, Manfred Hauswirth
EUROCRYPT
1997
Springer
13 years 11 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
SIGCSE
1993
ACM
102views Education» more  SIGCSE 1993»
13 years 11 months ago
The internet programming contest: a report and philosophy
Programming contests can provide a high-profile method for attracting interest in computer science. We describe our philosophy as it pertains to the purpose and merits of program...
Vivek Khera, Owen L. Astrachan, David Kotz
TYPES
1994
Springer
13 years 11 months ago
A Concrete Final Coalgebra Theorem for ZF Set Theory
A special final coalgebra theorem, in the style of Aczel's [2], is proved within standard Zermelo-Fraenkel set theory. Aczel's AntiFoundation Axiom is replaced by a varia...
Lawrence C. Paulson
CHINZ
2007
ACM
13 years 11 months ago
Users dealing with spam and spam filters: some observations and recommendations
The email communication system is threatened by unsolicited commercial email aka spam. In response, spam filters have been deployed widely to help reduce the amount of spam users ...
Christopher Lueg, Sam Martin