Sciweavers

135 search results - page 22 / 27
» Secure Electronic Voting - A Framework
Sort
View
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
14 years 4 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
EV
2008
86views Hardware» more  EV 2008»
13 years 11 months ago
Long-term Retention in E-Voting - Legal Requirements and Technical Implementation
: Legally binding elections require retention of specified election data such as balloting material. This applies to paper-based as well as electronic elections. However, in German...
Rotraud Gitter, Lucie Langer, Susanne Okunick, Zoi...
HIJ
2008
82views more  HIJ 2008»
13 years 9 months ago
Supporting grid-based clinical trials in Scotland
As clinical trials and medical population studies grow in size and complexity, a computational infrastructure that can underpin such studies is highly desirable. This should addre...
Richard O. Sinnott, A. J. Stell, Oluwafemi Ajayi
SACMAT
2005
ACM
14 years 3 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
IWFM
2003
13 years 11 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins