Sciweavers

135 search results - page 19 / 27
» Secure Electronic Voting - A Framework
Sort
View
SAFECOMP
1998
Springer
15 years 3 months ago
Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architecture
By-wire systems have been established for several years in the area of aircraft construction and there are now approaches to utilize this technology in vehicles. The required elect...
Thomas Ringler, J. Steiner, R. Belschner, Bernd He...
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
15 years 5 months ago
Protocols for data-hiding based text document security and automatic processing
Text documents, in electronic and hardcopy forms, are and will probably remain the most widely used kind of content in our digital age. The goal of this paper is to overview proto...
Frédéric Deguillaume, Yuriy Rytsar, ...
CCS
2001
ACM
15 years 3 months ago
A verifiable secret shuffle and its application to e-voting
We present a mathematical construct which provides a cryptographic protocol to verifiably shuffle a sequence of k modular integers, and discuss its application to secure, universa...
C. Andrew Neff
ATAL
2006
Springer
15 years 1 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
113
Voted
MA
1997
Springer
149views Communications» more  MA 1997»
15 years 3 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...