The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses the implementation of the voting scheme based on mix-net technology. The advantages of employing this technology are that voters can vote-and-go, and that it is flexible enough to be used for variety of vote-expression methods, while ensuring the privacy of votes and the elimination of faulty players. The most attractive security feature of this scheme is its universal verifiability;...
We discuss an implementation of a network voting scheme based on mix-net technology. We employed the scheme presented at Financial Cryptography 2002, but replaced the numeric computations with those on a elliptic curve. As a result, we obtained three times speed up and data length shortening to one third. The system has been employed in a private organization with roughly 20,000 voters since 2004.
At the preliminary design stage for a highway bridge 81 m long, a three‐span continuous girder, including a span of about 30 m, is preferable from the point of construction cost. Generally, the concern is that girder bridges with spans of 30 m, which have a fundamental natural frequency of about 3 Hz, have large traffic‐induced vibrations due to the coupling dynamic response with heavy vehicles having...
Existing studies on the security of biometric authentication with template protection have considered the adversaries who obtain only protected templates. Since biometric authentication systems transmit data other than the protected templates, we need to consider how to secure biometric authentication systems against adversaries with those data. In this paper, we propose a classification of adversaries...
We construct an atomistic silica pore model mimicking templated mesoporous silica MCM-41, which has molecular-level surface roughness, with the aid of the electron density profile (EDP) of MCM-41 obtained from X-ray diffraction data. Then, we present the GCMC simulations of argon adsorption on our atomistic silica pore models for two different MCM-41 samples at 75, 80, and 87 K, and the results are...
VCCI had started Kit Module Program in 2005 in order to control EMI of the modules. In this program, the electric current on the power line (PL) of the power distribution network (PDN) on the printed circuit board (PCB) is measured by the magnetic probe (MP) method which has been standardized by IEC for the EMI testing of LSI. In this paper, the test result of several kinds of module is presented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.