Sciweavers

915 search results - page 120 / 183
» Proof labeling schemes
Sort
View
ASIACRYPT
2010
Springer
13 years 6 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
MOC
2011
13 years 3 months ago
Convergence of a mixed method for a semi-stationary compressible Stokes system
We propose and analyze a finite element method for a semi– stationary Stokes system modeling compressible fluid flow subject to a Navier– slip boundary condition. The veloci...
Kenneth H. Karlsen, Trygve K. Karper
TCOS
2010
13 years 2 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
WDAG
2009
Springer
166views Algorithms» more  WDAG 2009»
14 years 2 months ago
New Bounds for the Controller Problem
The (M, W)-controller, originally studied by Afek, Awerbuch, Plotkin, and Saks, is a basic ted tool that provides an abstraction for managing the consumption of a global resource ...
Yuval Emek, Amos Korman
SOUPS
2009
ACM
14 years 2 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi