Sciweavers

1064 search results - page 149 / 213
» Cryptography from Anonymity
Sort
View
116
Voted
DC
2007
15 years 3 months ago
Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings
We present a randomizedself-stabilizing leaderelection protocol and a randomizedself-stabilizing token circulation protocol under an arbitrary scheduler on anonymous and unidirect...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
108
Voted
NAR
1998
92views more  NAR 1998»
15 years 3 months ago
5S rRNA Data Bank
In this paper we present the updated version of the compilation of 5S rRNA and 5S rDNA nucleotide sequences. It contains 1622 primary structures of 5S rRNAs and 5S rRNA genes from...
Maciej Szymanski, Thomas Specht, Miroslawa Z. Barc...
134
Voted
DMS
2010
146views Multimedia» more  DMS 2010»
15 years 2 months ago
Electronic Payment and Online Gaming
We will evaluate electronic payment (ePayment) systems by employing a use-value analysis. The key success factors of ePayment systems are security and flexibility. Not surprisingly...
Gerald Draxler, Johannes Sametinger, Andreas Wiesa...
152
Voted
IH
2010
Springer
15 years 1 months ago
The Reverse Statistical Disclosure Attack
Abstract. Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on f...
Nayantara Mallesh, Matthew K. Wright
138
Voted
WOTE
2010
15 years 1 months ago
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
Abstract. While electronic elections promise the possibility of convenient, efficient and secure facilities for recording and tallying votes, recent studies have highlighted inadeq...
Stéphanie Delaune, Steve Kremer, Mark Ryan