Sciweavers

2270 search results - page 356 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
PST
2004
15 years 5 months ago
Practical Remote Electronic Elections for the UK
Abstract-- The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing RE...
Tim Storer, Ishbel Duncan
CORR
2010
Springer
208views Education» more  CORR 2010»
15 years 4 months ago
MapReduce for Integer Factorization
Abstract. Integer factorization is a very hard computational problem. Currently no ecient algorithm for integer factorization is publicly known. However, this is an important probl...
Javier Tordable
99
Voted
CORR
2008
Springer
96views Education» more  CORR 2008»
15 years 4 months ago
On the Superdistribution of Digital Goods
: Business models involving buyers of digital goods in the distribution process are called superdistribution schemes. We review the state-of-the art of research and application of ...
Andreas U. Schmidt
IJNSEC
2008
112views more  IJNSEC 2008»
15 years 4 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo
ENTCS
2007
113views more  ENTCS 2007»
15 years 4 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb