Sciweavers

13987 search results - page 65 / 2798
» The Two Guards Problem
Sort
View
112
Voted
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
15 years 8 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
MPC
2010
Springer
147views Mathematics» more  MPC 2010»
15 years 7 months ago
Designing an Algorithmic Proof of the Two-Squares Theorem
We show a new and constructive proof of the two-squares theorem, based on a somewhat unusual, but very effective, way of rewriting the so-called extended Euclid’s algorithm. Rat...
João F. Ferreira
119
Voted
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
108
Voted
ICIP
2009
IEEE
15 years 10 days ago
Cat face detection with two heterogeneous features
In this paper, we propose a generic and efficient object detection framework based on two heterogeneous features and demonstrate effectiveness of our method for a cat face detecti...
Tatsuo Kozakaya, Satoshi Ito, Susumu Kubota, Osamu...
128
Voted
CPM
2005
Springer
87views Combinatorics» more  CPM 2005»
15 years 8 months ago
Two Dimensional Parameterized Matching
Two equal length strings, or two equal sized two-dimensional texts, parameterize match (p-match) if there is a one-one mapping (relative to the alphabet) of their characters. Two-...
Carmit Hazay, Moshe Lewenstein, Dekel Tsur