Sciweavers

2421 search results - page 55 / 485
» Message from the Co-Chairs
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 11 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
11 years 10 months ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
CHI
2002
ACM
14 years 8 months ago
Automated message prioritization: making voicemail retrieval more efficient
Navigating through new voicemail messages to find messages of interest is a time-consuming task, particularly for high-volume users. When checking messages under a time constraint...
Meridith Ringel, Julia Hirschberg
HAID
2007
Springer
14 years 2 months ago
Shake2Talk: Multimodal Messaging for Interpersonal Communication
This paper explores the possibilities of using audio and haptics for interpersonal communication via mobile devices. Drawing on the literature on current messaging practises, a new...
Lorna M. Brown, John Williamson
GLOBECOM
2006
IEEE
14 years 1 months ago
Relay Channel with Private Messages
Abstract—The relay channel with private messages (RCPM) is a generalized relay channel model where in addition to the traditional communication from source to destination (assist...
Ramy Tannious, Aria Nosratinia