Sciweavers

1769 search results - page 150 / 354
» Cryptography
Sort
View
118
Voted
PST
2004
15 years 4 months ago
Practical Remote Electronic Elections for the UK
Abstract-- The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing RE...
Tim Storer, Ishbel Duncan
136
Voted
FC
2010
Springer
175views Cryptology» more  FC 2010»
15 years 4 months ago
Cryptographic Cloud Storage
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We...
Seny Kamara, Kristin Lauter
135
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 3 months ago
Quantum Three-Pass protocol: Key distribution using quantum superposition states
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a phot...
Yoshito Kanamori, Seong-Moo Yoo
106
Voted
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 3 months ago
Minimal weight expansions in Pisot bases
For applications to cryptography, it is important to represent numbers with a small number of non-zero digits (Hamming weight) or with small absolute sum of digits. The problem of ...
Christiane Frougny, Wolfgang Steiner
CSI
2008
113views more  CSI 2008»
15 years 3 months ago
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infra...
Klaus Plößl, Hannes Federrath