Sciweavers

20807 search results - page 4111 / 4162
» How to read a paper
Sort
View
USS
2010
13 years 6 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
USS
2010
13 years 6 months ago
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for mayor and city council members using the ScantegrityII voting system--the first time any end-to-end (e2e) vo...
Richard Carback, David Chaum, Jeremy Clark, John C...
VRST
2010
ACM
13 years 6 months ago
Augmentation techniques for efficient exploration in head-mounted display environments
Physical characteristics and constraints of today's head-mounted displays (HMDs) often impair interaction in immersive virtual environments (VEs). For instance, due to the li...
Benjamin Bolte, Gerd Bruder, Frank Steinicke, Klau...
WD
2010
13 years 6 months ago
Coexistence of radio networks using Aloha
: In this paper we use an analytical model to study how two radio networks : a primary network and a secondary network can coexist within the same area. We use a very simple protoc...
Bartlomiej Blaszczyszyn, Paul Mühlethaler, Sk...
BIOSIG
2009
127views Biometrics» more  BIOSIG 2009»
13 years 6 months ago
Supplemental Biometric User Authentication for Digital-Signature Smart Cards
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Olaf Henniger, Ulrich Waldmann
« Prev « First page 4111 / 4162 Last » Next »