Sciweavers

785 search results - page 4 / 157
» Two remarks on remotality
Sort
View
CSI
2007
192views more  CSI 2007»
13 years 7 months ago
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved sc...
Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhamma...
ICICS
2005
Springer
14 years 29 days ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
BMCBI
2008
138views more  BMCBI 2008»
13 years 7 months ago
Application of nonnegative matrix factorization to improve profile-profile alignment features for fold recognition and remote ho
Background: Nonnegative matrix factorization (NMF) is a feature extraction method that has the property of intuitive part-based representation of the original features. This uniqu...
Inkyung Jung, Jaehyung Lee, Soo-Young Lee, Dongsup...
SIGIR
2011
ACM
12 years 10 months ago
ViewSer: enabling large-scale remote user studies of web search examination and interaction
Web search behaviour studies, including eye-tracking studies of search result examination, have resulted in numerous insights to improve search result quality and presentation. Ye...
Dmitry Lagun, Eugene Agichtein