Sciweavers

1256 search results - page 148 / 252
» A Simple E-Voting Protocol
Sort
View
ICPR
2006
IEEE
16 years 2 months ago
The Twin Towers Cluster in Torah Codes
In this paper we describe a Torah Code experiment which: ? Focuses on a famous contemporary event. ? Has a simple and explicit data collection. ? Has considerably simpler measurem...
Eliyahu Rips, Art Levitt
PERCOM
2007
ACM
16 years 22 days ago
A User Interaction Model for NFC Enabled Applications
Near field communication (NFC) is a short-range wireless protocol that allows users to connect devices and access content and services by simply holding enabled devices near each ...
Yaw Anokwa, Gaetano Borriello, Trevor Pering, Roy ...
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
15 years 10 months ago
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Abstract. We propose a semantically-secure public-key encryption scheme whose security is polynomialtime equivalent to the hardness of solving random instances of the subset sum pr...
Vadim Lyubashevsky, Adriana Palacio, Gil Segev
ISCC
2009
IEEE
147views Communications» more  ISCC 2009»
15 years 8 months ago
P2P cache-and-forward mechanisms for mobile ad hoc networks
We investigate the problem of spreading information contents in a wireless ad hoc network. In our vision, information dissemination should satisfy the following requirements: (i) ...
Claudio Casetti, Carla-Fabiana Chiasserini, Marco ...
WOWMOM
2009
ACM
167views Multimedia» more  WOWMOM 2009»
15 years 7 months ago
Bio-inspired link quality estimation for wireless mesh networks
—In this paper, the problem of estimating the link quality in mesh networks has been considered. Such a process is a major task to develop an efficient network layer, since it a...
Marcello Caleffi, Luigi Paura