Peter

Results: 45375



#Item
31Voting / Politics / Elections / Group decision-making / Electronic voting / Election technology / Electoral fraud / Voter-verified paper audit trail / Scantegrity / ThreeBallot / Election audits / Postal voting

Public Evidence from Secret Ballots Matthew Bernhard/ Josh Benaloh† J. Alex Halderman/ Ronald L. Rivest Peter Y. A. Ryan◦ Philip B. Stark‡ Vanessa Teague. Poorvi L. Vora§ Dan S. Wallach? † Microsoft Research /

Add to Reading List

Source URL: mbernhard.com

Language: English - Date: 2017-08-03 23:20:50
32

Vectorizing Higher-Order Masking Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, and Ko Stoffelen Motivation •

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-04-23 01:42:38
    33Software engineering / Computing / Computer programming / Procedural programming languages / Functional languages / Data types / Standard ML / Type theory / Scope / ML / Variable / Operator

    Moscow ML Language Overview Version 2.00 of June 2000 Sergei Romanenko, Russian Academy of Sciences, Moscow, Russia Claudio Russo, Cambridge University, Cambridge, United Kingdom Peter Sestoft, Royal Veterinary and Agric

    Add to Reading List

    Source URL: mosml.org

    Language: English - Date: 2014-08-29 03:47:37
    34Cryptocurrencies / Economy / Money / Finance / Counterparty / Blockchain / Bitcoin / Tether / Smart contract / Ethereum / Tokenization

    Conceptual Framework for Legal & Risk Assessment of Blockchain Crypto Property (BCP) Dr. Luka Müller, Stephan D. Meyer, Christine Gschwend, Peter Henschel Genesis Version

    Add to Reading List

    Source URL: www.mme.ch

    Language: English - Date: 2017-09-27 09:18:40
    35Mathematics / Computer arithmetic / Algebra / Abstract algebra / Abstract interpretation / Interval arithmetic / Two's complement / Interval / Signedness / Logarithm / Modular arithmetic / Division by zero

    1 Interval Analysis and Machine Arithmetic: Why Signedness Ignorance Is Bliss GRAEME GANGE, JORGE A. NAVAS, PETER SCHACHTE, HARALD SØNDERGAARD, and PETER J. STUCKEY, The University of Melbourne, Australia

    Add to Reading List

    Source URL: jorgenavas.github.io

    Language: English - Date: 2018-10-25 12:43:22
    36Software / Computing / Free software / Web browsers / Cross-platform software / JavaScript / Web programming / Firefox / Cross-site scripting / Proxy server / Trusted computing base / Browser extension

    Improving Web Privacy And Security with a Cost-Benefit Analysis of the Web API by Peter Snyder B.A., Lawrence University, 2006

    Add to Reading List

    Source URL: www.peteresnyder.com

    Language: English - Date: 2018-06-29 22:01:44
    37Economy / Macroeconomics / Money / Monetary policy / Monetary economics / State-owned enterprise / Macroeconomic policy / Economy of China / Central bank / Money supply / Nominal rigidity

    HONG KONG INSTITUTE FOR MONETARY RESEARCH PUSHING ON A STRING: STATE-OWNED ENTERPRISES AND MONETARY POLICY TRANSMISSION IN CHINA Hongyi Chen, Ran Li and Peter Tillmann

    Add to Reading List

    Source URL: www.hkimr.org

    Language: English - Date: 2018-10-02 23:18:40
    38Computing / Software engineering / Concurrent computing / Concurrency control / C++ / Parallel computing / Transaction processing / Concurrency / Linearizability / C++11 / Thread / POSIX Threads

    The C/C++ Memory Model: Overview and Formalization Mark Batty Jasmin Blanchette Susmit Sarkar Peter Sewell

    Add to Reading List

    Source URL: user.it.uu.se

    Language: English - Date: 2015-05-22 10:51:47
    39Computing / Digital media / Chemistry / Cryptocurrencies / Recruitment / LinkedIn / Social media / Zinc / InterPlanetary File System / Everipedia / Switch / Ethereum

    WHITEPAPER Version 2.0 – Q1 2018 By Luke Shipley & Peter Brooke WHITEPAPER

    Add to Reading List

    Source URL: token.zinc.work

    Language: English - Date: 2018-10-02 04:51:00
    40Cryptography / Computing / Computer architecture / Advanced Encryption Standard / AES implementations / ARM architecture / Block cipher / Bit array / 64-bit computing / Processor register

    Vectorizing Higher-Order Masking Benjamin Gr´egoire1 and Kostas Papagiannopoulos2 and Peter Schwabe2 and Ko Stoffelen2 1 2

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-02-09 10:00:32
    UPDATE