Sciweavers

1064 search results - page 149 / 213
» Cryptography from Anonymity
Sort
View
DC
2007
13 years 9 months ago
Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings
We present a randomizedself-stabilizing leaderelection protocol and a randomizedself-stabilizing token circulation protocol under an arbitrary scheduler on anonymous and unidirect...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
NAR
1998
92views more  NAR 1998»
13 years 9 months ago
5S rRNA Data Bank
In this paper we present the updated version of the compilation of 5S rRNA and 5S rDNA nucleotide sequences. It contains 1622 primary structures of 5S rRNAs and 5S rRNA genes from...
Maciej Szymanski, Thomas Specht, Miroslawa Z. Barc...
DMS
2010
146views Multimedia» more  DMS 2010»
13 years 7 months ago
Electronic Payment and Online Gaming
We will evaluate electronic payment (ePayment) systems by employing a use-value analysis. The key success factors of ePayment systems are security and flexibility. Not surprisingly...
Gerald Draxler, Johannes Sametinger, Andreas Wiesa...
IH
2010
Springer
13 years 7 months ago
The Reverse Statistical Disclosure Attack
Abstract. Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on f...
Nayantara Mallesh, Matthew K. Wright
WOTE
2010
13 years 7 months ago
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
Abstract. While electronic elections promise the possibility of convenient, efficient and secure facilities for recording and tallying votes, recent studies have highlighted inadeq...
Stéphanie Delaune, Steve Kremer, Mark Ryan