Sciweavers

2472 search results - page 105 / 495
» Parallel Key Exchange
Sort
View
128
Voted
NDSS
1998
IEEE
15 years 6 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
85
Voted
CCS
2006
ACM
15 years 6 months ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao
112
Voted
CCR
2000
101views more  CCR 2000»
15 years 2 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
121
Voted
ICMCS
2008
IEEE
150views Multimedia» more  ICMCS 2008»
15 years 9 months ago
Parallel model combination and word recognition in soccer audio
The audio scene from broadcast soccer can be used for identifying highlights from the game. Audio cues derived from these sources provide valuable information about game events, a...
Jack H. Longton, Philip J. B. Jackson
SWAT
1994
Springer
120views Algorithms» more  SWAT 1994»
15 years 6 months ago
Parallel Dynamic Lowest Common Ancestors
This paper gives a CREW PRAM algorithm for the problem of finding lowest common ancestors in a forest under the insertion of leaves and roots and the deletion of leaves. For a fore...
Erik Schenk