Sciweavers

1358 search results - page 232 / 272
» Proceedings
Sort
View
91
Voted
USS
2008
15 years 2 months ago
The Case for Networked Remote Voting Precincts
Voting in national elections from the comfort of one's home computer may never be practical or secure, but we argue that remote network voting can be both practical and secur...
Daniel Sandler, Dan S. Wallach
99
Voted
ATAL
2008
Springer
15 years 2 months ago
Strategic betting for competitive agents
In many multiagent settings, each agent's goal is to come out ahead of the other agents on some metric, such as the currency obtained by the agent. In such settings, it is no...
Liad Wagman, Vincent Conitzer
89
Voted
CCS
2008
ACM
15 years 2 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
123
Voted
CCS
2008
ACM
15 years 2 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
116
Voted
CHI
2008
ACM
15 years 2 months ago
Introducing item response theory for measuring usability inspection processes
Usability evaluation methods have a long history of research. Latest contributions significantly raised the validity of method evaluation studies. But there is still a measurement...
Martin Schmettow, Wolfgang Vietze