David Chaum

Results: 43



#Item
31Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes David Chaum Stefan Popoveniuc§  Richard Carback∗

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes David Chaum Stefan Popoveniuc§ Richard Carback∗

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:55:06
    32Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA  Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

    Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

    Add to Reading List

    Source URL: dedis.cs.yale.edu

    Language: English - Date: 2012-06-25 13:47:28
    33Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms By David Chaum Communications of the ACM February 1981 Volume 24

    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms By David Chaum Communications of the ACM February 1981 Volume 24

    Add to Reading List

    Source URL: www.cs.utexas.edu

    Language: English - Date: 2005-09-05 20:19:56
      34Davetli Konuşmacılar  Director of Sophos Labs, VP SophosLabs & GEO Konu : Threat Landscape Demystified Abstract : Mark Harris will look at the current threat landscape and highlight current trends, such as Blackhat SEO

      Davetli Konuşmacılar Director of Sophos Labs, VP SophosLabs & GEO Konu : Threat Landscape Demystified Abstract : Mark Harris will look at the current threat landscape and highlight current trends, such as Blackhat SEO

      Add to Reading List

      Source URL: www.bilgiguvenligi.org.tr

      Language: English - Date: 2013-02-06 12:29:33
      35Communication Privacy and Censorship Resistance Vitaly Shmatikov Privacy on Public Networks • Internet is designed as a public network

      Communication Privacy and Censorship Resistance Vitaly Shmatikov Privacy on Public Networks • Internet is designed as a public network

      Add to Reading List

      Source URL: www.sti.uniurb.it

      Language: English - Date: 2014-09-11 02:41:52
      36Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection, Financial Cryptography 2000, LNCS Series, Springer-Verlag, 2000. NRL Release Number[removed]Authentic Attr

      Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection, Financial Cryptography 2000, LNCS Series, Springer-Verlag, 2000. NRL Release Number[removed]Authentic Attr

      Add to Reading List

      Source URL: www.nrl.navy.mil

      Language: English - Date: 2013-04-29 11:50:54
      37APPROVAL SHEET  Title of Thesis: Security Innovations in the Punchscan Voting System Name of Candidate:

      APPROVAL SHEET Title of Thesis: Security Innovations in the Punchscan Voting System Name of Candidate:

      Add to Reading List

      Source URL: www.cisa.umbc.edu

      Language: English - Date: 2008-04-24 18:37:00
      38Sleeping dogs lie on a bed of onions but wake when mixed Paul Syverson Naval Research Laboratory, USA.  Abstract. We introduce and investigate sleeper attacks and explore

      Sleeping dogs lie on a bed of onions but wake when mixed Paul Syverson Naval Research Laboratory, USA. Abstract. We introduce and investigate sleeper attacks and explore

      Add to Reading List

      Source URL: www.syverson.org

      Language: English - Date: 2012-03-07 09:26:38
      39Random-Sample Elections Far lower cost, better quality and more democratic David Chaum

      Random-Sample Elections Far lower cost, better quality and more democratic David Chaum

      Add to Reading List

      Source URL: rs-elections.com

      Language: English - Date: 2014-03-15 20:42:14
      40LNCS[removed]Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA

      LNCS[removed]Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA

      Add to Reading List

      Source URL: www.cs.elte.hu

      Language: English - Date: 2006-03-02 14:49:50