Sciweavers

2601 search results - page 215 / 521
» Secure Rewarding Schemes
Sort
View
132
Voted
IADIS
2004
15 years 5 months ago
Voting with Designated Verifier Signature-Like Protocol
We propose in this paper a new voting scheme where the voter, while receiving a receipt for his/her vote allowing further contestations, cannot use it to reveal the vote to other u...
Emmanuel Dall'Olio, Olivier Markowitch
119
Voted
PST
2004
15 years 5 months ago
Practical Remote Electronic Elections for the UK
Abstract-- The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing RE...
Tim Storer, Ishbel Duncan
94
Voted
CORR
2008
Springer
103views Education» more  CORR 2008»
15 years 3 months ago
Secret Communication with Feedback
Secure communication with feedback is studied. An achievability scheme in which the backward channel is used to generate a shared secret key is proposed. The scenario of binary sy...
Deniz Gündüz, D. Richard Brown III, H. V...
113
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
Efficient String-Commitment from Weak Bit-Commitment
We study security amplification for weak bit-commitment schemes and improve the efficiency of (black-box) transformations in both the information-theoretic and computational setti...
Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Ya...
137
Voted
IPPS
2006
IEEE
15 years 9 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner