Sciweavers

1018 search results - page 151 / 204
» Remote User Authentication Using Public Information
Sort
View
LISA
2007
13 years 10 months ago
RepuScore: Collaborative Reputation Management Framework for Email Infrastructure
We propose RepuScore, a collaborative reputation management framework over email infrastrucure, which allows participating organizations to establish sender accountability on the ...
Gautam Singaraju, Brent ByungHoon Kang
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 8 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
14 years 2 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
ECSCW
2001
13 years 9 months ago
Cognitive properties of a whiteboard: A case study in a trauma centre
Distributed cognition as an approach to collaborative work holds that a work unit is cognitive system in which cognitive activities are carried out jointly by workers with the use ...
Yan Xiao, Caterina Lasome, Jacqueline A. Moss, Col...
ICCV
2007
IEEE
14 years 9 months ago
Webcam Synopsis: Peeking Around the World
The world is covered with millions of webcams. Some are private, but many transmit everything in their field of view over the internet 24 hours a day. A web search finds public we...
Yael Pritch, Alex Rav-Acha, Avital Gutman, Shmuel ...