Sciweavers

100 search results - page 19 / 20
» Universal Designated-Verifier Signatures
Sort
View
PLDI
2005
ACM
15 years 3 months ago
Jungloid mining: helping to navigate the API jungle
Reuse of existing code from class libraries and frameworks is often difficult because APIs are complex and the client code required to use the APIs can be hard to write. We obser...
David Mandelin, Lin Xu, Rastislav Bodík, Do...
FC
2004
Springer
112views Cryptology» more  FC 2004»
15 years 3 months ago
The Vector-Ballot e-Voting Approach
Looking at current cryptographic-based e-voting protocols, one can distinguish three basic design paradigms (or approaches): (a) Mix-Networks based, (b) Homomorphic Encryption base...
Aggelos Kiayias, Moti Yung
WS
2003
ACM
15 years 3 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
15 years 2 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
MICCAI
1999
Springer
15 years 2 months ago
Analysis of Functional MRI Data Using Mutual Information
Abstract. A new information-theoretic approach is presented for analyzing fMRI data to calculate the brain activation map. The method is based on a formulation of the mutualinforma...
Andy Tsai, John W. Fisher III, Cindy Wible, Willia...