Sciweavers

1017 search results - page 190 / 204
» Register computations on ordinals
Sort
View
NDSS
2003
IEEE
14 years 27 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesā€”the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
WWW
2003
ACM
14 years 26 days ago
WS-Membership - Failure Management in a Web-Services World
An important factor in the successful deployment of federated web-services-based business activities will be the ability to guarantee reliable distributed operation and execution....
Werner Vogels, Christopher Ré
EUROSYS
2010
ACM
14 years 22 days ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made signiļ¬cant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
ICALP
2010
Springer
14 years 13 days ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
AIWORC
2000
IEEE
14 years 2 days ago
Distance Learning Using Web-Based Multimedia Environment
The "schooling industry" is faced with an inescapable demand to redefine its endeavors in terms of producing learning, rather than providing instructions. We propose a h...
Khalid J. Siddiqui, Junaid Ahmed Zubairi