-
1
-
-
72849138345
-
Electronic voting machines versus traditional methods: Improved preference, similar performance
-
ACM, April
-
S. P. Everett, K. K. Greene, M. D. Byrne, D. S. Wallach, K. Derr, D. Sandler, and T. Torous, "Electronic voting machines versus traditional methods: improved preference, similar performance," Proc. the twenty-sixth annual SIGCHI conference on Human factors in computing systems, ACM, April 2008.
-
(2008)
Proc. the twenty-sixth annual SIGCHI conference on Human factors in computing systems
-
-
Everett, S.P.1
Greene, K.K.2
Byrne, M.D.3
Wallach, D.S.4
Derr, K.5
Sandler, D.6
Torous, T.7
-
4
-
-
55849104918
-
Specifying and verifying requirements for election processes
-
Digital Government Society of North America
-
B. I. Simidchieva, M. S. Marzilli, L. A. Clarke, and L. J. Osterweil, "Specifying and verifying requirements for election processes," Proc. the 2008 international conference on Digital government research, Digital Government Society of North America, 2008.
-
(2008)
Proc. the 2008 international conference on Digital government research
-
-
Simidchieva, B.I.1
Marzilli, M.S.2
Clarke, L.A.3
Osterweil, L.J.4
-
5
-
-
34548179123
-
Requirements and Evaluation Procedures for eVoting
-
IEEE
-
M. Volkamer and M. McGaley, "Requirements and Evaluation Procedures for eVoting," Proc. The second international conference on Availability, reliability and security, IEEE, 2007, pp. 895-902.
-
(2007)
Proc. The second international conference on Availability, reliability and security
, pp. 895-902
-
-
Volkamer, M.1
McGaley, M.2
-
6
-
-
70349238641
-
Rethinking Accountable Privacy Supporting Services
-
Fairfax, Virginia, USA, ACM
-
J. Camenisch, T. Groş, and T. S., "Rethinking Accountable Privacy Supporting Services," Proc. the 4th ACM workshop on Digital identity management, Fairfax, Virginia, USA, ACM, 2008, pp. 1-8.
-
(2008)
Proc. the 4th ACM workshop on Digital identity management
, pp. 1-8
-
-
Camenisch, J.1
Groş, T.2
S, T.3
-
7
-
-
77953904148
-
NIST Special Publication 800-57: Recommendation for Key Management - Part 1: General (Revised)
-
NIST
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "NIST Special Publication 800-57: Recommendation for Key Management - Part 1: General (Revised)," NIST, Ed.: NIST, 2007.
-
(2007)
NIST, Ed
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
10
-
-
51149086318
-
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for WSNs
-
Salzburg, Austria
-
O. Ugus, D. Westhoff, R. Laue, A. Shoufan, and S. A. Huss, "Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for WSNs," Proc. 2nd Workshop on Embedded Systems Security (WESS'2007), A Workshop of the IEEE/ACM EMSOFT'2007 and the Embedded Systems Week, Salzburg, Austria, 2007.
-
(2007)
Proc. 2nd Workshop on Embedded Systems Security (WESS'2007), A Workshop of the IEEE/ACM EMSOFT'2007 and the Embedded Systems Week
-
-
Ugus, O.1
Westhoff, D.2
Laue, R.3
Shoufan, A.4
Huss, S.A.5
-
11
-
-
34047122668
-
Secure Electronic Voting for Mobile Communications
-
X. Yi, P. Cerone, and Y. Zhang, "Secure Electronic Voting for Mobile Communications," Proc. Vehicular Technology Conference, vol. 2, 2006.
-
(2006)
Proc. Vehicular Technology Conference
, vol.2
-
-
Yi, X.1
Cerone, P.2
Zhang, Y.3
-
13
-
-
34247183782
-
Supporting symmetric 128-bit AES in networked embedded systems: An elliptic curve key establishment protocol-on-chip
-
R. Duraisamy, Z. Salcic, M. A. Strangio, and M. Morales-Sandoval, "Supporting symmetric 128-bit AES in networked embedded systems: an elliptic curve key establishment protocol-on-chip," EURASIP Journal on Embedded Systems, 2007.
-
(2007)
EURASIP Journal on Embedded Systems
-
-
Duraisamy, R.1
Salcic, Z.2
Strangio, M.A.3
Morales-Sandoval, M.4
-
14
-
-
77953567600
-
A workload characterization of elliptic curve cryptography methods in embedded environments
-
I. Branovic, R. Giorgi, and E. Martinelli, "A workload characterization of elliptic curve cryptography methods in embedded environments," ACM SIGARCH Computer Architecture News, vol. 32, pp. 27-34, 2004.
-
(2004)
ACM SIGARCH Computer Architecture News
, vol.32
, pp. 27-34
-
-
Branovic, I.1
Giorgi, R.2
Martinelli, E.3
-
15
-
-
3543102147
-
Analysis of an electronic voting system
-
IEEE
-
T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach, "Analysis of an electronic voting system," Proc. IEEE Symposium on Security and Privacy, IEEE, 2004, pp. 27-40.
-
(2004)
Proc. IEEE Symposium on Security and Privacy
, pp. 27-40
-
-
Kohno, T.1
Stubblefield, A.2
Rubin, A.D.3
Wallach, D.S.4
-
16
-
-
57449084663
-
Are your votes really counted?: Testing the security of real-world electronic voting systems
-
Seattle, Washington, USA, ACM
-
D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, R. Kemmerer, W. Robertson, F. Valeur, and G. Vigna, "Are your votes really counted?: testing the security of real-world electronic voting systems," Proc. the 2008 international symposium on Software testing and analysis, Seattle, Washington, USA, ACM, 2008.
-
(2008)
Proc. the 2008 international symposium on Software testing and analysis
-
-
Balzarotti, D.1
Banks, G.2
Cova, M.3
Felmetsger, V.4
Kemmerer, R.5
Robertson, W.6
Valeur, F.7
Vigna, G.8
-
17
-
-
63449137138
-
An efficient security algorithm in mobile computing for resource constrained mobile devices
-
Vancouver, Canada, ACM
-
J. Light and D. David, "An efficient security algorithm in mobile computing for resource constrained mobile devices," Proc. the 4th ACM symposium on QoS and security for wireless and mobile networks, Vancouver, Canada, ACM, 2008.
-
(2008)
Proc. the 4th ACM symposium on QoS and security for wireless and mobile networks
-
-
Light, J.1
David, D.2
-
19
-
-
56749106005
-
A secure and resilient WSN roadside architecture for intelligent transport systems
-
Alexandria, Virginia, USA
-
J.-M. Bohli, A. Hessler, O. Ugus, and D. Westhoff, "A secure and resilient WSN roadside architecture for intelligent transport systems," Proc. the first ACM conference on Wireless network security, Alexandria, Virginia, USA, 2008, pp. 161-171.
-
(2008)
Proc. the first ACM conference on Wireless network security
, pp. 161-171
-
-
Bohli, J.-M.1
Hessler, A.2
Ugus, O.3
Westhoff, D.4
-
20
-
-
72849145135
-
Lightweight API
-
on-line] accessed on March 15, from http://, The Legion of the Bouncy Castle
-
Bouncy Castle, "Lightweight API," [on-line] accessed on March 15, 2009 from http://www.bouncycastle.org/, The Legion of the Bouncy Castle, 2008.
-
(2008)
-
-
-
21
-
-
33845322957
-
A new encryption algorithm over elliptic curve
-
T. Dillon, X. Yu, and E. Chang, Eds. Perth, WA: IEEE
-
S. Han, E. Chang, W.-q. Liu, V. Potdar, and J. Wang, "A new encryption algorithm over elliptic curve," in INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, T. Dillon, X. Yu, and E. Chang, Eds. Perth, WA: IEEE, 2005.
-
(2005)
INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business
-
-
Han, S.1
Chang, E.2
Liu, W.-Q.3
Potdar, V.4
Wang, J.5
-
22
-
-
72849137846
-
-
on-line] accessed on April 15, 2009 from, Computer Security Division, National Institute of Standards and Technology NIST
-
NIST, "Advanced Encryption Standard Algorithm Validation List," [on-line] accessed on April 15, 2009 from http://csrc.nist.gov/, Computer Security Division, National Institute of Standards and Technology (NIST), 2009.
-
(2009)
Advanced Encryption Standard Algorithm Validation List
-
-
-
23
-
-
33744948730
-
A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
-
Proc. IAPR, Hong Kong China
-
F. Han, J. Hu, X. Yu, Y. Feng, and J. Zhou, "A novel hybrid crypto-biometric authentication scheme for ATM based banking applications," Proc. IAPR International Conference on Biometrics Published at Lecture Notes in Computer Science vol. 3832, Hong Kong China, 2006.
-
(2006)
International Conference on Biometrics Published at Lecture Notes in Computer Science
, vol.3832
-
-
Han, F.1
Hu, J.2
Yu, X.3
Feng, Y.4
Zhou, J.5
-
24
-
-
38549175800
-
Generation of reliable PINs from fingerprints
-
Glasgow, Scotland, June
-
F. Han, J. Hu, L. He and Y. Wang, "Generation of reliable PINs from fingerprints", Proc. Security Symposium IEEE International Conference on Communication (ICC), Glasgow, Scotland, June, 2007.
-
(2007)
Proc. Security Symposium IEEE International Conference on Communication (ICC)
-
-
Han, F.1
Hu, J.2
He, L.3
Wang, Y.4
-
25
-
-
34748896200
-
Investigating correlation-based fingerprint authentication schemes for mobile devices using the J2ME technology
-
Alghero, Italy, 7-8 June
-
Y. Wang, J. Hu, K. Xi and B.V.K. Vijaya Kumar, "Investigating correlation-based fingerprint authentication schemes for mobile devices using the J2ME technology. Proc. IEEE Workshop on Automatic Identification Advanced Technologies, AutoID 2007. Alghero, Italy, 7-8 June 2007.
-
(2007)
Proc. IEEE Workshop on Automatic Identification Advanced Technologies, AutoID
-
-
Wang, Y.1
Hu, J.2
Xi, K.3
Vijaya Kumar, B.V.K.4
-
26
-
-
51249099350
-
A k-nearest neighbor approach for user authentication through biometric keystroke dynamics
-
Beijing, China, 19-23 May
-
J. Hu, D. Gingrich A. Sentosa, "A k-nearest neighbor approach for user authentication through biometric keystroke dynamics," Proc. IEEE ICC Conference, Beijing, China, 19-23 May, 2008.
-
(2008)
Proc. IEEE ICC Conference
-
-
Hu, J.1
Gingrich, D.2
Sentosa, A.3
|