Sciweavers

5324 search results - page 86 / 1065
» Internet Security Protocols
Sort
View
EVOTING
2004
91views Hardware» more  EVOTING 2004»
14 years 11 months ago
From Legal Principles to an Internet Voting System
: Past research on Internet voting has been concentrated on two aspects. First, there are investigations to find the appropriate balance between anonymity and authentication. Secon...
Melanie Volkamer, Dieter Hutter
IADIS
2003
14 years 11 months ago
E-Democracy: Internet Voting
Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have ...
Guido Schryen
GD
2008
Springer
14 years 11 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
15 years 2 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...
ICNP
2005
IEEE
15 years 3 months ago
A Family of Collusion Resistant Protocols for Instantiating Security
In this paper, we focus on the problem of identifying a family of collusion resistant protocols that demonstrate a tradeoff between the number of secrets that users maintain and t...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar