Sciweavers

1818 search results - page 178 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
142
Voted
ICMCS
2005
IEEE
296views Multimedia» more  ICMCS 2005»
15 years 9 months ago
An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the ...
Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
137
Voted
CCS
2005
ACM
15 years 9 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
104
Voted
PG
2003
IEEE
15 years 8 months ago
Voxelization in Common Sampling Lattices
In this paper we introduce algorithms to voxelize polygonal meshes in common sampling lattices. In the case of Cartesian lattices, we complete the separability and minimality proo...
Haris Widjaya, Torsten Möller, Alireza Enteza...
124
Voted
EUROGP
2001
Springer
103views Optimization» more  EUROGP 2001»
15 years 8 months ago
Computational Complexity, Genetic Programming, and Implications
Recent theory work has shown that a Genetic Program (GP) used to produce programs may have output that is bounded above by the GP itself [l]. This paper presents proofs that show t...
Bart Rylander, Terence Soule, James A. Foster
CTRSA
2009
Springer
95views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Statistically Hiding Sets
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables a prover to commit a set to a verifier, without revealing even the size of the...
Manoj Prabhakaran, Rui Xue