نتایج جستجو برای: statistical mix

تعداد نتایج: 400661  

2008
Riza Aditya Byoungcheon Lee Colin Boyd Ed Dawson

Receipt-freeness is an essential security property in electronic voting to prevent vote buying, selling or coercion. In this paper, we propose an efficient mixnet-based receipt-free voting scheme by modifying a voting scheme of Lee et al. The receipt-freeness property is obtained through the randomization service given by a trusted administrator, and assuming that two-way untappable channel is ...

2004
Kun Peng Riza Aditya Colin Boyd Ed Dawson Byoungcheon Lee

A mix-network accepts a set of ciphertexts and outputs the corresponding plaintexts in a random order. It is an important tool in schemes requiring anonymity of messages, such as in secure e-voting and e-auction schemes. A mix-network is comprised of shuffling and decryption operations. A robust mix-network must provide proofs that it shuffles and decrypts its input ciphertexts and outputs thei...

2008
L. Allen Cooley

i DISCLAIMER The contents of this report reflect the views of the authors who are solely responsible for the facts and the accuracy of the data presented herein. The contents do not necessarily reflect the official views and policies of the National Center for Asphalt Technology of Auburn University. This report does not constitute a standard, specification, or regulation. ii ABSTRACT Stone mat...

Journal: :IACR Cryptology ePrint Archive 2012
Shahram Khazaei Douglas Wikström

We study mix-nets with randomized partial checking (RPC) as proposed by Jakobsson, Juels, and Rivest (2002). RPC is a technique to verify the correctness of an execution both for Chaumian and homomorphic mix-nets. The idea is to relax the correctness and privacy requirements to achieve a more efficient mix-net. We identify serious issues in the original description of mix-nets with RPC and show...

Journal: :The Journal of veterinary medical science 2005
Noboru Oishi Mari Maeda Koichi Makimura Toshiko Sawaguchi Makio Hayashiya Takuya Kubo Rui Kano Atsuhiko Hasegawa Michihiro Kasahara

The genetic variability of 182 unrelated mongrel dogs living in various areas of Japan (from Hokkaido to Okinawa) was studied by collecting their blood. Ten microsatellite loci were chosen from different autosomal chromosomes. After combining a few rare adjoining alleles to allelic classes, it was confirmed that the Hardy-Weinberg equilibrium was attained in each locus. The polymorphic informat...

Journal: :CoRR 2014
Dirk Eddelbuettel Murray Stokely Jeroen Ooms

Modern data collection and analysis pipelines often involve a sophisticated mix of applications written in general purpose and specialized programming languages. Many formats commonly used to import and export data between different programs or systems, such as CSV or JSON, are verbose, inefficient, not type-safe, or tied to a specific programming language. Protocol Buffers are a popular method...

1998
K. W. Chase W. H. Greenwood

Tolerance analysis is a valuable tool for reducing manufacturing costs by improving producibility. Several useful methods of selecting design tolerances are presented with examples. The common and more advanced tolerance analysis methods are also reviewed and evaluated. A simple new tolerance analysis model suitable for designers is described as an alternative to the advanced methods. It is muc...

2009
Alan Guth

The formula for the entropy density of black-body radiation is given in Lecture Notes 7. The derivation of this formula has been left to the statistical mechanics course that you either have taken or hopefully will take. For our purposes, the important point is that the early universe remains very close to thermal equilibrium, and therefore entropy is conserved. The conservation of entropy appl...

2009
Jorge Blasco Alís Julio César Hernández Castro Juan E. Tapiador Arturo Ribagorda Miguel A. Orellana-Quiros

Hydan is a steganographic tool which can be used to hide any kind of information inside executable files. In this work, we present an efficient distinguisher for it: We have developed a system that is able to detect executable files with embedded information through Hydan. Our system uses statistical analysis of instruction set distribution to distinguish between files with no hidden informatio...

2011
Alan Guth

The formula for the entropy density of black-body radiation is given in Lecture Notes 6. The derivation of this formula has been left to the statistical mechanics course that you either have taken or hopefully will take. For our purposes, the important point is that the early universe remains very close to thermal equilibrium, and therefore entropy is conserved. The conservation of entropy appl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید