Sciweavers

1834 search results - page 312 / 367
» Public Key Cryptography
Sort
View
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
14 years 1 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
FC
2003
Springer
101views Cryptology» more  FC 2003»
14 years 29 days ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
IWCMC
2010
ACM
14 years 25 days ago
Dividing sensitive ranges based mobility prediction algorithm in wireless networks
As wireless networks have been widely deployed for public mobile services, predicting the location of a mobile user in wireless networks became an interesting and challenging prob...
Yuliang Tang, Der-Jiunn Deng, Yannan Yuan, Chun-Ch...
HICSS
2002
IEEE
139views Biometrics» more  HICSS 2002»
14 years 21 days ago
Examining Quality of Care -- How Poor Information Flow Can Impact on Hospital Workflow and Affect Patient Outcomes
This paper argues that effective management of patient image data can enhance patient care. It examines the workflow and information flows involved in the search for image based d...
Reeva M. Lederman, Iain Morrison
ISVLSI
2002
IEEE
104views VLSI» more  ISVLSI 2002»
14 years 20 days ago
Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation
Modular inverse computation is needed in several public key cryptographic applications. In this work, we present two VLSI hardware implementations used in the calculation of Montg...
Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, &Ccedi...