Sciweavers

5665 search results - page 267 / 1133
» Introduction to Computer Security
Sort
View
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
14 years 4 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
WETICE
2003
IEEE
14 years 4 months ago
Trust Dynamics for Collaborative Global Computing
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. The security of thes...
Colin English, Sotirios Terzis, Waleed Wagealla, H...
ICEIS
2002
IEEE
14 years 3 months ago
Thin Servers - An Architecture to Support Arbitrary Placement of Computation in the Internet
: The Internet is experiencing an overwhelming growth that will have a negative impact on its performance and quality of service. In this paper we describe a new architecture that ...
Juan Carlos Diaz y Carballo, Alan Dearle, Richard ...
SACRYPT
1998
Springer
14 years 3 months ago
Computational Alternatives to Random Number Generators
In this paper, we present a simple method for generating random-based signatures when random number generators are either unavailable or of suspected quality (malicious or accident...
David M'Raïhi, David Naccache, David Pointche...
SPEECH
2010
125views more  SPEECH 2010»
13 years 5 months ago
Automatic intonation assessment for computer aided language learning
In this paper the nature and relevance of the information provided by intonation is discussed in the framework of second language learning. As a consequence, an automatic intonati...
Juan Pablo Arias, Néstor Becerra Yoma, Hira...