Sciweavers

683 search results - page 14 / 137
» Voting Technologies and Trust
Sort
View
65
Voted
ISW
2005
Springer
15 years 3 months ago
A Practical Voting Scheme with Receipts
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, ...
IJNSEC
2008
78views more  IJNSEC 2008»
14 years 9 months ago
Fault Tolerant Weighted Voting Algorithms
Agreement algorithms can be categorized in different ways. One categorization of such algorithms is based on whether the final decisions are exact or inexact. In inexact algorithm...
Azad H. Azadmanesh, Alireza Farahani, Lotfi Najjar
JHSN
2006
267views more  JHSN 2006»
14 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
15 years 3 months ago
An Empirical Investigation of the Roles of Outcome Controls and Psychological Factors in Collaboration Technology Supported Virt
The purpose of this research is to examine whether outcome controls of group work (i.e. time pressure and reward) trigger psychological factors (i.e. distraction, motivation, and ...
Fang He, Souren Paul