Sciweavers

609 search results - page 60 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ACISP
2001
Springer
14 years 2 months ago
Elliptic Curve Cryptography on a Palm OS Device
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
André Weimerskirch, Christof Paar, Sheuelin...
STOC
1999
ACM
122views Algorithms» more  STOC 1999»
14 years 1 months ago
Oblivious Transfer and Polynomial Evaluation
Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input is a polynomial P, and a receiver whose input is a value α. At the end of the protocol t...
Moni Naor, Benny Pinkas
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 9 months ago
Ellogon: A New Text Engineering Platform
This paper presents Ellogon, a multi-lingual, cross-platform, general-purpose text engineering environment. Ellogon was designed in order to aid both researchers in natural langua...
Georgios Petasis, Vangelis Karkaletsis, Georgios P...
IEEECIT
2010
IEEE
13 years 8 months ago
Hiding Short Secret Messages based on Linguistic Steganography and Manual Annotation
—This article shows to what extent it is possible to develop a public simple mechanism for hiding information in natural language by means of the use of templates and manual anno...
Alfonso Muñoz Muñoz, Justo Carracedo...
IFM
2010
Springer
147views Formal Methods» more  IFM 2010»
13 years 7 months ago
Symbolic Model-Checking of Optimistic Replication Algorithms
Abstract. The Operational Transformation (OT) approach, used in many collaborative editors, allows a group of users to concurrently update replicas of a shared object and exchange ...
Hanifa Boucheneb, Abdessamad Imine, Manal Najem