Sciweavers

152 search results - page 26 / 31
» Securing Communications in the Smart Home
Sort
View
WICOMM
2008
258views more  WICOMM 2008»
13 years 7 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
DAGSTUHL
2007
13 years 9 months ago
CodeVoting: protecting against malicious vote manipulation at the voter's PC
Voting in uncontrolled environments, such as the Internet comes with a price, the price of having to trust in uncontrolled machines the collection of voter’s vote. An uncontrolle...
Rui Joaquim, Carlos Ribeiro
SCN
2010
Springer
176views Communications» more  SCN 2010»
13 years 6 months ago
The Fiat-Shamir Transform for Group and Ring Signature Schemes
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signat...
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
PSYCHNOLOGY
2007
113views more  PSYCHNOLOGY 2007»
13 years 7 months ago
Psychological Implications of Domestic Assistive Technology for the Elderly
The ROBOCARE Domestic Environment (RDE) is the result of a three-year project aimed at developing cognitive support technology for elderly people. Specifically, the domestic envir...
Amedeo Cesta, Gabriella Cortellessa, Vittoria Giul...