Sciweavers

700 search results - page 93 / 140
» words 2005
Sort
View
ESORICS
2007
Springer
15 years 10 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
140
Voted
INDOCRYPT
2007
Springer
15 years 10 months ago
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
This paper analyzes the best speeds that can be obtained for single-scalar multiplication with variable base point by combining a huge range of options: – many choices of coordin...
Daniel J. Bernstein, Peter Birkner, Tanja Lange, C...
125
Voted
ICMCS
2006
IEEE
139views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A Measure for Evaluating Retrieval Techniques based on Partially Ordered Ground Truth Lists
For the RISM A/II collection of musical incipits (short extracts of scores, taken from the beginning), we have established a ground truth based on the opinions of human experts. I...
Rainer Typke, Remco C. Veltkamp, Frans Wiering
SIGIR
2006
ACM
15 years 10 months ago
Bias and the limits of pooling
Modern retrieval test collections are built through a process called pooling in which only a sample of the entire document set is judged for each topic. The idea behind pooling is...
Chris Buckley, Darrin Dimmick, Ian Soboroff, Ellen...
AINA
2005
IEEE
15 years 10 months ago
Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SM
Today, the use of anycast address is quite limited. One of the reasons is because there is no routing protocol providing a global anycasting service. In this paper we design and im...
Satoshi Matsunaga, Shingo Ata, Hiroshi Kitamura, M...