Sciweavers

475 search results - page 76 / 95
» Designs in Product Association Schemes
Sort
View
TARK
2007
Springer
14 years 1 months ago
Knowledge-based modelling of voting protocols
We contend that reasoning about knowledge is both natural and pragmatic for verification of electronic voting protocols. We present a model in which desirable properties of elect...
A. Baskar, Ramaswamy Ramanujam, S. P. Suresh
CCS
2005
ACM
14 years 1 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
EUROCRYPT
2004
Springer
14 years 1 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
CHI
2006
ACM
14 years 8 months ago
Fast, flexible filtering with phlat
Systems for fast search of personal information are rapidly becoming ubiquitous. Such systems promise to dramatically improve personal information management, yet most are modeled...
Edward Cutrell, Daniel C. Robbins, Susan T. Dumais...
ICC
2007
IEEE
14 years 2 months ago
Multiple-Access Slightly Frequency-Shifted Reference Ultra-Wideband Communications for Dense Multipath Channels
Abstract— The design of ultra-wideband (UWB) communication systems has proven to be challenging. Coherent systems require a rake receiver with many taps that is difficult to tra...
Qu Zhang, Dennis Goeckel