Sciweavers

135 search results - page 22 / 27
» Secure Electronic Voting - A Framework
Sort
View
113
Voted
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 10 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
113
Voted
EV
2008
86views Hardware» more  EV 2008»
15 years 5 months ago
Long-term Retention in E-Voting - Legal Requirements and Technical Implementation
: Legally binding elections require retention of specified election data such as balloting material. This applies to paper-based as well as electronic elections. However, in German...
Rotraud Gitter, Lucie Langer, Susanne Okunick, Zoi...
137
Voted
HIJ
2008
82views more  HIJ 2008»
15 years 3 months ago
Supporting grid-based clinical trials in Scotland
As clinical trials and medical population studies grow in size and complexity, a computational infrastructure that can underpin such studies is highly desirable. This should addre...
Richard O. Sinnott, A. J. Stell, Oluwafemi Ajayi
125
Voted
SACMAT
2005
ACM
15 years 9 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
119
Voted
IWFM
2003
15 years 5 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins