Sciweavers

157 search results - page 20 / 32
» Universally Composable Signcryption
Sort
View
CSFW
2012
IEEE
11 years 10 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
CCS
2007
ACM
14 years 1 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
SIGUCCS
2004
ACM
14 years 1 months ago
Spam software evaluation, training, and support: fighting back to reclaim the email inbox
This paper explains two projects dealing with spam recently completed at Iowa State University (ISU). The first project was undertaken by a team composed of members of the campus ...
Jeff Balvanz, Don Paulsen, Joe Struss
AIS
2006
Springer
13 years 7 months ago
Developing methods to understand discourse and workspace in distributed computer-mediated interaction
This paper presents on-going research towards understanding the discourse and workspace in computer mediated interactions. More specifically we present the development of a series...
Renate Fruchter, Humberto Cavallin
ISMIR
2000
Springer
225views Music» more  ISMIR 2000»
13 years 11 months ago
Beyond VARIATIONS: Creating a Digital Music Library
This presentation will focus primarily on work being done at Indiana University in the area of digital music libraries, with some discussion of related efforts. Indiana University...
Jon W. Dunn