Sciweavers

255 search results - page 9 / 51
» Principles for Entity Authentication
Sort
View
IJNSEC
2011
116views more  IJNSEC 2011»
13 years 2 months ago
An Authentication Protocol Based on Kerberos 5
We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle’s secretkey will be independent of the user password to overcome the weak...
Eman El-Emam, Magdy Koutb, Hamdy Kelash, Osama S. ...
ASIACRYPT
2001
Springer
13 years 11 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
JUCS
2010
108views more  JUCS 2010»
13 years 2 months ago
Extending the Methods for Computing the Importance of Entity Types in Large Conceptual Schemas
: Visualizing and understanding large conceptual schemas requires the use of specific methods. These methods generate clustered, summarized, or focused schemas that are easier to v...
Antonio Villegas, Antoni Olivé
ICASSP
2011
IEEE
12 years 11 months ago
Named entity recognition from Conversational Telephone Speech leveraging Word Confusion Networks for training and recognition
Named Entity (NE) recognition from the results of Automatic Speech Recognition (ASR) is challenging because of ASR errors. To detect NEs, one of the options is to use a statistica...
Gakuto Kurata, Nobuyasu Itoh, Masafumi Nishimura, ...
GRID
2004
Springer
14 years 23 days ago
On The Feasibility of Running Entity-Level Simulations on Grid Platforms
Scientists have long relied on abstract models to study phenomena that are too complex for direct observation and experimentation. As new scientific modeling methodologies emerge...
Alan Su, Francine Berman, Henri Casanova