Zobrazeno 1 - 10
of 19
pro vyhledávání: '"KHADER, DALIA"'
Autor:
Khader, Dalia
This thesis' major contribution is to propose an attribute based authentication scheme (AAS). An A AS scheme is a new cryptosystem that extends the field of public key cryptography and more precisely digital signatures. An AAS scheme allows a verifie
Externí odkaz:
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.500716
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:827-841
Autor:
KHADER, DALIA, SIDDIQI, HUSNA
Publikováno v:
ISACA Journal; 2022, Issue 4, p22-26, 5p
Autor:
Balboni, Paolo, Barata, Martim Taborda, Basile, Cataldo, Bella, Giampaolo, Beuchelt, Gerald, Caballero, Albert, Capparelli, Francesco, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Curry, Samuel J.J., Dara, Rozita, Ellis, Scott R., Gross, William F., Jr., Gurkok, Cem, Hamed, Tarfa, Hao, Feng, Harmening, Jim, Hoffman, Rich, Huseynov, Emin, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Karunamoorthy, Aruna, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Kotapati, Kameswari, Kremer, Stefan C., Lancrenon, Jean, LaPorta, Thomas F., Lewis, Keith, Liu, Peng, Mansoor, Bill, Mims, Nailah A., Padmavathi, V., Pandya, Pramod, Paraboschi, Stefano, Patil, Harsh Kupwade, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Saminathan, R., Santana, Mario D., Seigneur, Jean-Marc, Soper, Daniel S., Spies, Terence, Walker, Jesse, West, Michael A., Yan, Liang, Yee, George O.M., Zhao, Gansen
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:xvii-xviii
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:e109-e123
Publikováno v:
In Computer and Information Security Handbook Edition: Second Edition. 2013:705-720
Publikováno v:
USENIX Journal of Election Technology and Systems, 1(1), 62-81. (2013).
Pret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses indicate that, subject to certain assumptions, Pret a Voter is receipt free, i.e. a voter has no way to construct a proof to a coercer of how she voted. In this pape
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::ff6dda7bf559ea2e4d1d24b233b38d3c
http://orbilu.uni.lu/handle/10993/13064
http://orbilu.uni.lu/handle/10993/13064
This technical report presents initial results of an ongoing research on Usability and Trust in Boardroom E-voting Systems. OpenVote, an implementation of one of the existing boardroom e-voting schemes, is used as our case study. The primary contribu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::732388e9f0df180b47b7f66b4cefd7d0
http://orbilu.uni.lu/handle/10993/9487
http://orbilu.uni.lu/handle/10993/9487
Publikováno v:
Trusted Systems (9783319315492); 2016, p114-129, 16p
Autor:
Amoroso, Edward G., Bardin, Jeffrey S., Basile, Cataldo, Berthold, Stefan, Beuchelt, Gerald, Bhaskar, Rahul, Braghin, Chiara, Caballero, Albert, Casalino, Matteo Maria, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Cremonini, Marco, Curry, Samuel J.J., Dara, Rozita, Day, Christopher, di Vimercati, Sabrina De Capitani, El Maliki, Tewfiq, Ellis, Scott R., Erbschloe, Michael, Fischer-Hbner, Simone, Foresti, Sara, Fulp, Errin W., Genovese, Angelo, Granova, Anna, Gross, William F., Guan, Yong, Gurkok, Cem, Hao, Feng, Hamed, Tarfa, Harmening, James T., Hoffman, Rich, Huseynov, Emin, Jakobsson, Markus, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Korba, Larry, Kotapati, Kameswari, Kremer, Stefan C., LaPorta, Thomas F., Lencrenon, Jean, Lewis, Keith, Liu, Peng, Livraga, Giovanni, Mallery, John R., Mansoor, Bill, Martin, Luther, McDonald, John, McGowan, John, Mims, Nailah, Mutti, Simone, Nicoletti, Peter F., Noble, Kevin, Pandya, Pramod, Patil, Harsh Kupwade, Paraboschi, Stefano, Peacock, Thea, Perkins, Ken, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Samarati, Pierangela, Santambrogio, Marco, Santana, Mario, Schneider, Steve, Scotti, Fabio, Seigneur, Jean-Marc, Slaviero, Marco, Soper, Daniel S., Spies, Terence, Stallings, William, Tsow, Alex, Walker, Jesse, West, Michael A., Wing, Dan, Yee, George O.M., Yan, Liang, Zabicki, Roman, Zhao, Gansen, Zias, Zhe
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:xxvii-xxx