Sciweavers

683 search results - page 23 / 137
» Voting Technologies and Trust
Sort
View
78
Voted
IEEECIT
2007
IEEE
15 years 3 months ago
An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks
Guojun Wang, Qiong Wang, Jiannong Cao, Minyi Guo
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
14 years 11 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 2 months ago
Can IT Help Government to Restore Public Trust?: Declining Public Trust and Potential Prospects of IT in the Public Sector
During the past four decades, public trust in governments has continued to diminish due to various administrative, political, socio-cultural, economic, and mass media causes. Focu...
M. Jae Moon
IDA
2009
Springer
14 years 7 months ago
Trajectory Voting and Classification Based on Spatiotemporal Similarity in Moving Object Databases
We propose a method for trajectory classification based on trajectory voting in Moving Object Databases (MOD). Trajectory voting is performed based on local trajectory similarity. ...
Costas Panagiotakis, Nikos Pelekis, Ioannis Kopana...
VOTEID
2007
Springer
15 years 3 months ago
Simulation-Based Analysis of E2E Voting Systems
Abstract. End-to-end auditable voting systems are expected to guarantee very interesting, and often sophisticated security properties, including correctness, privacy, fairness, rec...
Olivier de Marneffe, Olivier Pereira, Jean-Jacques...