Sciweavers

62 search results - page 8 / 13
» A Latency-Free Election Scheme
Sort
View
FC
2004
Springer
94views Cryptology» more  FC 2004»
15 years 1 months ago
Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast
Most voting schemes rely on a number of authorities. If too many of these authorities are dishonest then voter privacy may be violated. To give stronger guarantees of voter privacy...
Jens Groth
KAIS
2006
87views more  KAIS 2006»
14 years 10 months ago
Improving the performance of 1D object classification by using the Electoral College
Abstract It has been proven that districted matching schemes (e.g., the US presidential election scheme, also called the Electoral College) are more stable than undistricted matchi...
Liang Chen, Ruoyu Chen, Sharmin Nilufar
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 4 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
SASN
2003
ACM
15 years 3 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee
CSE
2009
IEEE
15 years 2 months ago
Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor Networks
—In this paper we propose a clustering and routing scheme for wireless sensor networks based on a self-organizing approach. The aim of this approach is for nodes to perform an in...
Ehssan Sakhaee, Naoki Wakamiya, Masayuki Murata