Sciweavers

2795 search results - page 444 / 559
» Recommended or Not
Sort
View
CJ
2007
106views more  CJ 2007»
13 years 7 months ago
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analyzed by researchers from the computer s...
Kim-Kwang Raymond Choo
IIE
2006
110views more  IIE 2006»
13 years 7 months ago
The Current Situation of Informatics Education in Mongolia
Mongolia started using Information and Communication Technology (ICT) in secondary education relatively late. The computer training and informatics has been included as a subject i...
Uyanga Sambuu
IIE
2006
84views more  IIE 2006»
13 years 7 months ago
Promoting Different Kinds of Learners towards Active Learning in the Web-Based Environment
According to many recent studies the effect of learning style on academic performance has been found to be significant and mismatch between teaching and learning styles causes lear...
Anu Haapala
IPM
2008
90views more  IPM 2008»
13 years 7 months ago
Interactive high-quality text classification
Automatic text classification (TC) is essential for information sharing and management. Its ideal goals are to achieve high-quality TC: (1) accepting almost all documents that sho...
Rey-Long Liu
IJBC
2006
93views more  IJBC 2006»
13 years 7 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li