Sciweavers

1018 search results - page 23 / 204
» Remote User Authentication Using Public Information
Sort
View
107
Voted
EGOV
2010
Springer
14 years 10 months ago
Information Strategies for Open Government: Challenges and Prospects for Deriving Public Value from Government Transparency
Information-based strategies to promote open government offer many opportunities to generate social and economic value through public use of government information. Public and poli...
Sharon S. Dawes, Natalie Helbig
ECTEL
2011
Springer
13 years 11 months ago
Remote Collaborative Multi-user Informal Learning Experiences: Design and Evaluation
This paper presents a customizable system used to develop a collaborative multi-user problem solving game. It addresses the increasing demand for appealing informal learning experi...
Ernesto Arroyo, Valeria Righi, Roger Tarrago, Patr...
IEEECIT
2010
IEEE
14 years 9 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
SEMWEB
2010
Springer
14 years 9 months ago
Using Semantics for Automating the Authentication of Web APIs
Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications bas...
Maria Maleshkova, Carlos Pedrinaci, John Domingue,...
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs