Sciweavers

766 search results - page 83 / 154
» How to Read a Signature
Sort
View
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
14 years 2 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
ACSAC
2005
IEEE
14 years 2 months ago
Lessons Learned: A Security Analysis of the Internet Chess Club
The Internet Chess Club (ICC) is a popular online chess server with more than 30,000 members worldwide including various celebrities and the best chess players in the world. Altho...
John Black, Martin Cochran, Martin Ryan Gardner
IHI
2010
127views Healthcare» more  IHI 2010»
13 years 3 months ago
Using clinical preferences in argumentation about evidence from clinical trials
Medical practice is increasingly based on the best available evidence, but the volume of information requires many clinicians to rely on systematic reviews rather than the primary...
Anthony Hunter, Matthew Williams
SPW
2004
Springer
14 years 2 months ago
The Dancing Bear: A New Way of Composing Ciphers
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
Ross Anderson
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 9 months ago
Open Graphs and Monoidal Theories
String diagrams are a powerful tool for reasoning about physical processes, logic circuits, tensor networks, and many other compositional structures. The distinguishing feature of...
Lucas Dixon, Aleks Kissinger