Sciweavers

666 search results - page 104 / 134
» Fair watermarking techniques
Sort
View
ESOP
2005
Springer
15 years 3 months ago
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of imp...
Steve Kremer, Mark Ryan
FC
2005
Springer
97views Cryptology» more  FC 2005»
15 years 3 months ago
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
Abstract. We propose a scheme for privacy-preserving escrow of financial transactions. The objective of the scheme is to preserve privacy and anonymity of the individual user enga...
Stanislaw Jarecki, Vitaly Shmatikov
LCPC
2005
Springer
15 years 3 months ago
Lightweight Monitoring of the Progress of Remotely Executing Computations
Abstract. The increased popularity of grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the u...
Shuo Yang, Ali Raza Butt, Y. Charlie Hu, Samuel P....
RT
2004
Springer
15 years 3 months ago
CC Shadow Volumes
We present a technique that uses culling and clamping (CC) for accelerating the performance of stencil-based shadow volume computation. Our algorithm reduces the fill requirement...
Brandon Lloyd, Jeremy Wend, Naga K. Govindaraju, D...
DSOM
2003
Springer
15 years 3 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...