Sciweavers

1282 search results - page 96 / 257
» Signing on signing off
Sort
View
IV
2003
IEEE
118views Visualization» more  IV 2003»
14 years 2 months ago
Requirements of Deaf User of Information Visualization An Interdisciplinary Approach
In literature exist many links to translation of speech into sign language and links to gesturing with avatars. But the author cannot get any link to a visualization of background...
Dirk Burmeister
ESA
2001
Springer
61views Algorithms» more  ESA 2001»
14 years 1 months ago
A Separation Bound for Real Algebraic Expressions
Real algebraic expressions are expressions whose leaves are integers and whose internal nodes are additions, subtractions, multiplications, divisions, k-th root operations for int...
Christoph Burnikel, Stefan Funke, Kurt Mehlhorn, S...
NDSS
2000
IEEE
14 years 1 months ago
Analysis of a Fair Exchange Protocol
We analyze an optimistic contract signing protocol of Asokan, Shoup, and Waidner as a case study in the applicability of formal methods to verification of fair exchange protocols...
Vitaly Shmatikov, John C. Mitchell
ASIACRYPT
2000
Springer
14 years 1 months ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...
NDSS
1999
IEEE
14 years 1 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot