Sciweavers

189 search results - page 25 / 38
» Leakage-Resilient Zero Knowledge
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Optimal wireless networks based on local channel state information
We consider distributed algorithms to optimize random access multihop wireless networks in the presence of fading. Since the associated optimization problem is neither convex nor ...
Yichuan Hu, Alejandro Ribeiro
DEXAW
1995
IEEE
101views Database» more  DEXAW 1995»
14 years 1 months ago
Principles and Tools for Authoring Knowledge-Rich Documents
Digital libraries can take advantage of documents that have their content (semantics) explicitly represented as knowledge structures. These knowledge-rich documents can be created ...
Robert P. Futrelle, Natalya Fridman Noy
CCS
2005
ACM
14 years 3 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
SECRYPT
2007
126views Business» more  SECRYPT 2007»
13 years 11 months ago
Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs
In this paper, we study the opacity property of verifiably encrypted signatures (VES) of Boneh et al. (proposed in Eurocrypt 2003). Informally, opacity implies that although some...
Amitabh Saxena
ICISS
2009
Springer
14 years 4 months ago
Remote Electronic Voting with Revocable Anonymity
We present a new remote, coercion-free electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce (and justify) the idea ...
Matt Smart, Eike Ritter