Sciweavers

65 search results - page 11 / 13
» Property Preserving Symmetric Encryption
Sort
View
CCS
2007
ACM
15 years 3 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
83
Voted
ICCV
2007
IEEE
15 years 3 months ago
Symmetries of non-rigid shapes
Symmetry and self-similarity is the cornerstone of Nature, exhibiting itself through the shapes of natural creations and ubiquitous laws of physics. Since many natural objects are...
Daniel Raviv, Alexander M. Bronstein, Michael M. B...
FSS
2008
105views more  FSS 2008»
14 years 9 months ago
The self-dual core and the anti-self-dual remainder of an aggregation operator
In most decisional models based on pairwise comparison between alternatives, the reciprocity of the individual preference representations expresses a natural assumption of rationa...
José Luis García-Lapresta, Ricardo A...
GLOBECOM
2006
IEEE
15 years 3 months ago
Secure Aggregation in Large Scale Overlay Networks
Overlay networks have been very useful in solving large scale data dissemination problems. In this paper, we consider the case of data gathering which is the inverse of disseminat...
Waseem Ahmad, Ashfaq A. Khokhar
CSFW
2002
IEEE
15 years 2 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey