Sciweavers

892 search results - page 121 / 179
» et 2007
Sort
View
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}ā...
Ueli M. Maurer, Stefano Tessaro
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 2 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 2 months ago
Parallel Repetition of Computationally Sound Protocols Revisited
Abstract. Parallel repetition is well known to reduce the error probability at an exponential rate for single- and multi-prover interactive proofs. Bellare, Impagliazzo and Naor (1...
Krzysztof Pietrzak, Douglas Wikström
TAMODIA
2007
13 years 10 months ago
Exploring Usability Needs by Human-Computer Interaction Patterns
Abstract. Covering quality aspects such as usability through the software development life cycle is challenging. These ā€œ-ilitiesā€ are generally difļ¬cult to grasp and usually ...
Markus Specker, Ina Wentzlaff
AIS
2007
Springer
13 years 9 months ago
Crafts praxis for critical wearables design
This paper treats the contemporary craft market as an under-researched resource for wearable computing, and investigates the alternative values and experiences that contemporary c...
Sarah Kettley