Sciweavers

24188 search results - page 239 / 4838
» Computing on Encrypted Data
Sort
View
150
Voted
FPL
2006
Springer
147views Hardware» more  FPL 2006»
15 years 7 months ago
Secure Content Distribution System Based on Run-Time Partial Hardware Reconfiguration
A secure content distribution system is prototyped based on run-time partial reconfigurability of an FPGA. The system provides a robust content protection scheme for online conten...
Yohei Hori, Hiroyuki Yokoyama, Kenji Toda
108
Voted
IFIP
2000
Springer
15 years 7 months ago
Representing Human and Non-human Stakeholders: On Speaking with Authority
Information systems research is concerned with complex imbroglios of human and non-human components. As researchers, we need ways to represent the intricacies of the different sta...
Athanasia Pouloudi, Edgar A. Whitley
140
Voted
ESORICS
2010
Springer
15 years 4 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
CSI
2007
91views more  CSI 2007»
15 years 3 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
147
Voted
IJISEC
2010
121views more  IJISEC 2010»
15 years 2 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes