Sciweavers

2421 search results - page 10 / 485
» Message from the Editor-in-Chief
Sort
View
PKC
2005
Springer
110views Cryptology» more  PKC 2005»
14 years 1 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...
NIPS
2004
13 years 9 months ago
Message Errors in Belief Propagation
Belief propagation (BP) is an increasingly popular method of performing approximate inference on arbitrary graphical models. At times, even further approximations are required, wh...
Alexander T. Ihler, John W. Fisher III, Alan S. Wi...
ESORICS
2009
Springer
14 years 8 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
NORDICHI
2004
ACM
14 years 29 days ago
InfoRadar: group and public messaging in the mobile context
Previous research has sought to utilize everyday messaging metaphors, such as the notice board, in location-based messaging systems. Unfortunately, many of the restrictions associ...
Matti Rantanen, Antti Oulasvirta, Jan Blom, Sauli ...
JNW
2008
146views more  JNW 2008»
13 years 6 months ago
User Behavior and IM Topology Analysis
The use of Instant Messaging, or IM, has become widely adopted in private and corporate communication. They can provide instant, multi-directed and multi-types of communications wh...
Qiang Yan, Xiaoyan Huang