2008
Authors
Koehler, C; Costa, D; Proença, J; Arbab, F;
Publication
ECEASST
Abstract
2008
Authors
Santos, LP; Reiners, D; Favre, J;
Publication
COMPUTERS & GRAPHICS-UK
Abstract
2008
Authors
Mendes, A;
Publication
Proceedings - Frontiers in Education Conference, FIE
Abstract
This project aims to develop a pen-based software tool that will assist in the process of doing mathematics by providing structured manipulation of handwritten mathematical expressions. The tool will be used to support the teaching of the dynamics of problem solving in a way that combines the advantages of the traditional blackboard style of teaching with the flexibility and accuracy of computer software. It will provide not only a simpler way to input mathematics - by allowing the recognition of handwritten mathematics - but also enhance students' understanding of the calculational techniques and facilitate the process of doing mathematics - by providing structure editing. Some of the most important features of this tool are the accurate selection and copy of expressions, the automatic application of algebraic rules and the use of gestures to apply them, and also the combined writing of mathematics and text. These features will have a major impact on writing, doing, and presenting mathematics. This project includes the required technical developments and also the application and testing of the tool in concrete situations, namely in mathematics and computing science courses. © 2008 IEEE.
2008
Authors
Barbosa, M; Cauchie, S; Brouard, T; Sousa, SMd;
Publication
IACR Cryptology ePrint Archive
Abstract
2008
Authors
Barbosa, M; Farshim, P;
Publication
IACR Cryptology ePrint Archive
Abstract
2008
Authors
Barbosa, M; Farshim, P;
Publication
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08
Abstract
Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity-based techniques, whilst removing the secret key escrow functionality inherent to the identity-based setting. Signcryption schemes achieve confidentiality and authentication simultaneously by combining public-key encryption and digital signatures, offering better overall performance and security. In this paper, we introduce the notion of certificateless signcryption and present an efficient construction which guarantees security under insider attacks, and therefore provides forward secrecy and non-repudiation. Copyright 2008 ACM.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.