Sciweavers

364 search results - page 32 / 73
» E-Voting System Security Optimization
Sort
View
CRYPTO
1995
Springer
111views Cryptology» more  CRYPTO 1995»
15 years 7 months ago
Fast Key Exchange with Elliptic Curve Systems
The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an elliptic curve over the field F2n. A software version of this using n = 155 can be o...
Richard Schroeppel, Hilarie K. Orman, Sean W. O'Ma...
ACSAC
2009
IEEE
15 years 10 months ago
Symmetric Cryptography in Javascript
—We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, a...
Emily Stark, Michael Hamburg, Dan Boneh
119
Voted
MOC
2010
14 years 10 months ago
Entropy-satisfying relaxation method with large time-steps for Euler IBVPs
This paper could have been given the title: "How to positively and implicitly solve Euler equations using only linear scalar advections." The new relaxation method we pr...
Frédéric Coquel, Quang Long Nguyen, ...
SPIC
2010
14 years 10 months ago
Attention-based video streaming
This paper presents a complete framework for attention-based video streaming for low bandwidth networks. First, motivated by the fovea-periphery distinction of biological vision s...
Çagatay Dikici, H. Isil Bozma
CCS
2011
ACM
14 years 3 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee