Sciweavers

9425 search results - page 147 / 1885
» Some Notes on Models and Modelling
Sort
View
NAA
2004
Springer
117views Mathematics» more  NAA 2004»
15 years 3 months ago
Parallel Performance of a 3D Elliptic Solver
It was recently shown that block-circulant preconditioners applied to a conjugate gradient method used to solve structured sparse linear systems arising from 2D or 3D elliptic prob...
Ivan Lirkov
HICSS
2003
IEEE
137views Biometrics» more  HICSS 2003»
15 years 3 months ago
Augmented Cognition: Allocation of Attention
We describe a novel, model-based approach to augmented cognition. We first discuss a subset of cognitive limitations that are likely to impair performance. We then note traditiona...
Misha Pavel, Guoping Wang, Kehai Li
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
15 years 2 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
CRYPTO
2001
Springer
136views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Session-Key Generation Using Human Passwords Only
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilis...
Oded Goldreich, Yehuda Lindell