Sciweavers

1256 search results - page 250 / 252
» A Simple E-Voting Protocol
Sort
View
JOC
2000
181views more  JOC 2000»
13 years 6 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
SIAMDM
2002
94views more  SIAMDM 2002»
13 years 6 months ago
How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems
A quorum system is a collection of sets (quorums) every two of which intersect. Quorum systems have been used for many applications in the area of distributed systems, including mu...
David Peleg, Avishai Wool
TCSV
2002
167views more  TCSV 2002»
13 years 6 months ago
Three-dimensional subband coding techniques for wireless video communications
This paper presents a new 3-D subband coding framework that is able to achieve a good balance between high compression performance and channel error resilience. Various data transf...
Hong Man, Ricardo L. de Queiroz, Mark J. T. Smith
SAC
2008
ACM
13 years 6 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
TMC
2008
210views more  TMC 2008»
13 years 6 months ago
Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa