Sciweavers

2416 search results - page 51 / 484
» The design and implementation of typed scheme
Sort
View
ASIACRYPT
2001
Springer
14 years 1 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
ASIACRYPT
2001
Springer
14 years 10 days ago
Short Signatures from the Weil Pairing
Abstract. We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyper-elliptic curves. The signature length is half the...
Dan Boneh, Ben Lynn, Hovav Shacham
ACSC
2005
IEEE
14 years 2 months ago
The Effect of Context and Application Type on Mobile Usability: An Empirical Study
This paper discusses the effect of context on mobile usability, proposes an expanded model of mobile application context, and conducts an empirical study to test a number of hypot...
Caspar Ryan, Atish Gonsalves
FECS
2006
152views Education» more  FECS 2006»
13 years 10 months ago
Lessons Learned From Different Types of Projects in Software Engineering
Educators teaching software engineering face a large problem when trying to assign "real world" projects. Should the instructors make up "real world" projects ...
Jennifer A. Polack-Wahl
CGO
2006
IEEE
14 years 13 days ago
Space-Efficient 64-bit Java Objects through Selective Typed Virtual Addressing
Memory performance is an important design issue for contemporary systems given the ever increasing memory gap. This paper proposes a space-efficient Java object model for reducing...
Kris Venstermans, Lieven Eeckhout, Koen De Bossche...