Sciweavers

1256 search results - page 157 / 252
» A Simple E-Voting Protocol
Sort
View
IPPS
1999
IEEE
15 years 5 months ago
Dynamic Process Composition and Communication Patterns in Irregularly Structured Applications
In this paper we describe one experiment in which a new coordination language, called MANIFOLD, is used to restructure an existing sequential Fortran code from computational uid dy...
C. T. H. Everaars, Barry Koren, Farhad Arbab
CRYPTO
1999
Springer
103views Cryptology» more  CRYPTO 1999»
15 years 5 months ago
Information Theoretically Secure Communication in the Limited Storage Space Model
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...
Yonatan Aumann, Michael O. Rabin
92
Voted
FM
1999
Springer
93views Formal Methods» more  FM 1999»
15 years 5 months ago
Group Principals and the Formalization of Anonymity
We introduce the concept of a group principal and present a number of different classes of group principals, including threshold-group-principals. These appear to naturally usefu...
Paul F. Syverson, Stuart G. Stubblebine
CSCW
1998
ACM
15 years 5 months ago
Artefact: A Framework for Low-Overhead Web-Based Collaborative Systems
The Artefact framework supports collaborative applications using standard browsers, a lightweight general-purpose Java applet, and HTML representations of objects and actions. We ...
Jeff Brandenburg, Boyce Byerly, Tom Dobridge, Jink...
99
Voted
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 5 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider