Sciweavers

1527 search results - page 282 / 306
» What About Wednesday
Sort
View
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 1 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
HICSS
2003
IEEE
62views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Study on the Impacts of Verbal Interaction in Proximate GSS Sessions
Although distributed Group Support Systems (GSS) are getting popular, there are still some limitations. One of the limitations is few substitutions for face-to-face (FTF) interact...
Tsuneki Mukahi, Gail Corbitt
NDSS
2003
IEEE
14 years 29 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the server...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
DOCENG
2003
ACM
14 years 29 days ago
Methods for the semantic analysis of document markup
We present an approach on how to investigate what kind of semantic information is regularly associated with the structural markup of scientific articles. This approach addresses ...
Petra Saskia Bayerl, Harald Lüngen, Daniela G...
ELPUB
2003
ACM
14 years 29 days ago
The Diversity of Trends, Experiences and Approaches in Electronic Publishing: Evidences of a Paradigm Shift on Communication
Electronic publishing constitutes one of the most exciting themes nowadays, amongst academics, at least, though substantial effects of IT usage for communication purposes in other...
Sely Maria de Souza Costa, Ana Cristina Moreira