Sciweavers

1256 search results - page 155 / 252
» A Simple E-Voting Protocol
Sort
View
PATMOS
2004
Springer
15 years 6 months ago
Run-Time Software Monitor of the Power Consumption of Wireless Network Interface Cards
Abstract. In this paper we present a new approach to power modeling and runtime power estimation for wireless network interface cards (WNICs). We obtain run-time power estimates by...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...
ACSAC
2002
IEEE
15 years 6 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
INFOCOM
2002
IEEE
15 years 5 months ago
Exact sampling of TCP Window States
We demonstrate how to apply Coupling from the Past, a simulation technique for exact sampling, to Markov chains based on TCP variants. This approach provides a new, statistically ...
Ashish Goel, Michael Mitzenmacher
ISCC
2002
IEEE
289views Communications» more  ISCC 2002»
15 years 5 months ago
Comparison of voice activity detection algorithms for VoIP
We discuss techniques for Voice Activity Detection (VAD) for Voice over Internet Protocol (VoIP). VAD aids in saving bandwidth requirement of a voice session thereby increasing th...
R. Venkatesha Prasad, Abhijeet Sangwan, H. S. Jama...
ACNS
2010
Springer
150views Cryptology» more  ACNS 2010»
15 years 5 months ago
Regulatory Compliant Oblivious RAM
Abstract. We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data re...
Bogdan Carbunar, Radu Sion