Sciweavers

1834 search results - page 225 / 367
» Public Key Cryptography
Sort
View
CRYPTO
1993
Springer
159views Cryptology» more  CRYPTO 1993»
14 years 1 months ago
Comparison of Three Modular Reduction Functions
Three modular reduction algorithms for large integers are compared with respect to their performance in portable software: the classical algorithm, Barrett’s algorithm and Montgo...
Antoon Bosselaers, René Govaerts, Joos Vand...
CANDC
2007
ACM
14 years 1 months ago
Produsage
The increasing prevalence of user-led content production especially in online environments from the Wikipedia to open news publications and open source software development communi...
Axel Bruns
PROPOR
2010
Springer
159views Languages» more  PROPOR 2010»
14 years 17 days ago
An Open-Source Speech Recognizer for Brazilian Portuguese with a Windows Programming Interface
Abstract. This work is part of the effort to develop a speech recognition system for Brazilian Portuguese. The resources for the training and test stages of this system, such as c...
Patrick Silva, Pedro Batista, Nelson Neto, Aldebar...
DGO
2003
118views Education» more  DGO 2003»
13 years 10 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
CCIA
2009
Springer
13 years 10 months ago
A Cryptographic Solution for Private Distributed Simple Meeting Scheduling
Meeting Scheduling is a suitable application for distributed computation, motivated by its privacy requirements. Previous work on this problem have considered some cryptographic te...
Javier Herranz, Stan Matwin, Pedro Meseguer, Jordi...