Sciweavers

773 search results - page 19 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
SIGCPR
2005
ACM
66views Hardware» more  SIGCPR 2005»
14 years 3 months ago
Who is "the IT workforce"?: challenges facing policy makers, educators, management, and research
Despite over six decades of research on the role and definition of the IT workforce, there remain numerous, and often contradictory, definitions related to the identity of this gr...
Michelle L. Kaarst-Brown, Indira R. Guzman
MOBICOM
1999
ACM
14 years 2 months ago
Next Century Challenges: Data-Centric Networking for Invisible Computing
Computing and telecommunications are maturing, and the next century promises a shift away from technology-driven general-purpose devices. Instead, we will focus on the needs of co...
Mike Esler, Jeffrey Hightower, Thomas E. Anderson,...
CE
2008
197views more  CE 2008»
13 years 9 months ago
ICT integration in the classroom: Challenging the potential of a school policy
Despite the assumption that the integration of ICT influences the entire school system, research focusing on ICT in schools is generally limited to the study of variables at class...
Jo Tondeur, Hilde van Keer, Johan van Braak, Marti...
EUROCRYPT
2003
Springer
14 years 2 months ago
A Framework for Password-Based Authenticated Key Exchange
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange protocols, in the common reference odel. Our protocol is actually an abstraction...
Rosario Gennaro, Yehuda Lindell
ECCC
2007
123views more  ECCC 2007»
13 years 9 months ago
Lossy Trapdoor Functions and Their Applications
We propose a general cryptographic primitive called lossy trapdoor functions (lossy TDFs), and use it to develop new approaches for constructing several important cryptographic to...
Chris Peikert, Brent Waters