Sciweavers

13987 search results - page 65 / 2798
» The Two Guards Problem
Sort
View
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
15 years 8 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
MPC
2010
Springer
147views Mathematics» more  MPC 2010»
15 years 7 months ago
Designing an Algorithmic Proof of the Two-Squares Theorem
We show a new and constructive proof of the two-squares theorem, based on a somewhat unusual, but very effective, way of rewriting the so-called extended Euclid’s algorithm. Rat...
João F. Ferreira
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
ICIP
2009
IEEE
15 years 25 days ago
Cat face detection with two heterogeneous features
In this paper, we propose a generic and efficient object detection framework based on two heterogeneous features and demonstrate effectiveness of our method for a cat face detecti...
Tatsuo Kozakaya, Satoshi Ito, Susumu Kubota, Osamu...
CPM
2005
Springer
87views Combinatorics» more  CPM 2005»
15 years 8 months ago
Two Dimensional Parameterized Matching
Two equal length strings, or two equal sized two-dimensional texts, parameterize match (p-match) if there is a one-one mapping (relative to the alphabet) of their characters. Two-...
Carmit Hazay, Moshe Lewenstein, Dekel Tsur