Sciweavers

516 search results - page 79 / 104
» Sets of k-Independent Strings
Sort
View
CRYPTO
2004
Springer
91views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Non-interactive Timestamping in the Bounded Storage Model
A timestamping scheme is non-interactive if a stamper can stamp a document without communicating with any other player. The only communication done is at validation time. Non-Inte...
Tal Moran, Ronen Shaltiel, Amnon Ta-Shma
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
14 years 2 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
ICDAR
2003
IEEE
14 years 1 months ago
Writer Identification using Innovative Binarised Features of Handwritten Numerals
The objective of this paper is to present a number of features that can be extracted from handwritten digits and used for author verification or identification of a person’s han...
Graham Leedham, Sumit Chachra
PODC
2003
ACM
14 years 1 months ago
A lattice-theoretic characterization of safety and liveness
The distinction between safety and liveness properties is due to Lamport who gave the following informal characterization. Safety properties assert that nothing bad ever happens w...
Panagiotis Manolios, Richard J. Trefler
CLEF
2003
Springer
14 years 1 months ago
The Multiple Language Question Answering Track at CLEF 2003
This paper reports on the pilot question answering track that was carried out within the CLEF initiative this year. The track was divided into monolingual and bilingual tasks: mono...
Bernardo Magnini, Simone Romagnoli, Alessandro Val...