Sciweavers

3238 search results - page 474 / 648
» Multi-return function call
Sort
View
102
Voted
WPES
2004
ACM
15 years 8 months ago
Soft blocking: flexible blocker tags on the cheap
A “blocker” tag is a form of privacy-enhancing radio-frequency identification (RFID) tag. It operates by interfering with the protocol in which a reader communicates individua...
Ari Juels, John G. Brainard
ASWSD
2004
Springer
15 years 8 months ago
Simulink Integration of Giotto/TDL
The paper first presents the integration options of what we call the Timing Description Language (TDL) with MathWorks' Simulink tools. Based on the paradigm of logical executi...
Wolfgang Pree, Gerald Stieglbauer, Josef Templ
ERCIMDL
2004
Springer
112views Education» more  ERCIMDL 2004»
15 years 8 months ago
System Support for Name Authority Control Problem in Digital Libraries: OpenDBLP Approach
In maintaining Digital Libraries, having bibliographic data up-to-date is critical, yet often minor irregularities may cause information isolation. Unlike documents for which vario...
Yoojin Hong, Byung-Won On, Dongwon Lee
EUROCRYPT
2004
Springer
15 years 8 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
FC
2004
Springer
112views Cryptology» more  FC 2004»
15 years 8 months ago
The Vector-Ballot e-Voting Approach
Looking at current cryptographic-based e-voting protocols, one can distinguish three basic design paradigms (or approaches): (a) Mix-Networks based, (b) Homomorphic Encryption base...
Aggelos Kiayias, Moti Yung