Sciweavers

683 search results - page 136 / 137
» Voting Technologies and Trust
Sort
View
BMCBI
2007
173views more  BMCBI 2007»
13 years 11 months ago
CGKB: an annotation knowledge base for cowpea (Vigna unguiculata L.) methylation filtered genomic genespace sequences
Background: Cowpea [Vigna unguiculata (L.) Walp.] is one of the most important food and forage legumes in the semiarid tropics because of its ability to tolerate drought and grow ...
Xianfeng Chen, Thomas W. Laudeman, Paul J. Rushton...
FAC
2006
122views more  FAC 2006»
13 years 11 months ago
The verified software repository: a step towards the verifying compiler
The Verified Software Repository is dedicated to a long-term vision of a future in which all computer systems justify the trust that Society increasingly places in them. This will ...
Juan Bicarregui, C. A. R. Hoare, J. C. P. Woodcock
TMC
2008
159views more  TMC 2008»
13 years 9 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
INFOCOM
2010
IEEE
13 years 8 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
TISSEC
2010
237views more  TISSEC 2010»
13 years 5 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...