Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
COGSCI
2011
50views more  COGSCI 2011»
11 years 4 months ago
A Phase Transition Model for the Speed-Accuracy Trade-Off in Response Time Experiments
Most models of response time (RT) in elementary cognitive tasks implicitly assume that the speed-accuracy trade-off is continuous: When payoffs or instructions gradually increase ...
Gilles Dutilh, Eric-Jan Wagenmakers, Ingmar Visser...
CORR
2007
Springer
76views Education» more  CORR 2007»
11 years 9 months ago
Guessing based on length functions
— Close relationships between guessing functions and length functions are established. Good length functions lead to good guessing functions. In particular, guessing in the incre...
Rajesh Sundaresan
CORR
2010
Springer
62views Education» more  CORR 2010»
11 years 10 months ago
Guessing Revisited: A Large Deviations Approach
The problem of guessing a random string is revisited and some prior results on guessing exponents are re-derived using the theory of large deviations. It is shown that if the seque...
Manjesh Kumar Hanawal, Rajesh Sundaresan
APAL
2007
90views more  APAL 2007»
11 years 10 months ago
Guessing and non-guessing of canonical functions
It is possible to control to a large extent, via semiproper forcing, the parameters (β0, β1) measuring the guessing density of the members of any given antichain of stationary s...
David Asperó
FC
2010
Springer
169views Cryptology» more  FC 2010»
12 years 1 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
12 years 2 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
CSFW
2008
IEEE
12 years 4 months ago
Composition of Password-Based Protocols
We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study w...
Stéphanie Delaune, Steve Kremer, Mark Ryan
books