Sciweavers

561 search results - page 64 / 113
» How to operate a PC without using the hands
Sort
View
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
15 years 6 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
USS
2010
14 years 11 months ago
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for mayor and city council members using the ScantegrityII voting system--the first time any end-to-end (e2e) vo...
Richard Carback, David Chaum, Jeremy Clark, John C...
ATAL
2005
Springer
15 years 7 months ago
Sequential auctions for objects with common and private values
Sequential auctions are an important mechanism for buying/selling multiple objects. Existing work has studied sequential auctions for objects that are exclusively either common va...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
APCCM
2004
15 years 2 months ago
Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE
A person working with diverse information sources--with possibly different formats and information models--may recognize and wish to express conceptual structures that are not exp...
Sudarshan Murthy, Lois M. L. Delcambre, David Maie...
PODC
1990
ACM
15 years 5 months ago
Composite Registers
We introduce a shared data object, called a composite register, that generalizes the notion of an atomic register. A composite register is an array-like shared data object that is...
James H. Anderson