Sciweavers

1017 search results - page 190 / 204
» Register computations on ordinals
Sort
View
NDSS
2003
IEEE
15 years 7 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
WWW
2003
ACM
15 years 7 months ago
WS-Membership - Failure Management in a Web-Services World
An important factor in the successful deployment of federated web-services-based business activities will be the ability to guarantee reliable distributed operation and execution....
Werner Vogels, Christopher Ré
EUROSYS
2010
ACM
15 years 7 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
ICALP
2010
Springer
15 years 6 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
145
Voted
AIWORC
2000
IEEE
15 years 6 months ago
Distance Learning Using Web-Based Multimedia Environment
The "schooling industry" is faced with an inescapable demand to redefine its endeavors in terms of producing learning, rather than providing instructions. We propose a h...
Khalid J. Siddiqui, Junaid Ahmed Zubairi