To search, Click below search items.
All Published Papers Search Service
Title
1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encryption
Author
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
Vol. 6 No. 1 pp. 217~226
Keywords
Electronic voting, Privacy, Security, Ballot-cancellation, Cryptography
Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow
Hyunjue Kim, Seungjoo Kim, Dongho Won
Vol. 6 No. 1 pp. 247~250
ID-based cryptography, Key escrow problem, Secure key issuing
Parity enhanced topology based spot area watermarking method for copyright protection of layered 3D triangular mesh data
Md. Mahfuzur Rahman, Koichi Harada
Vol. 6 No. 2 pp. 252~259
Watermarking, layered 3D triangular mesh model, topology based embedding, computer graphics, copyright protection.
A two-phase model based DSS for Grain Dispatching and Transportation
Haihong Yu, Jigui Sun, Zehai Li
Vol. 6 No. 2 pp. 6~11
grain dispatching and transportation, vehicle routing problem, graph-search algorithm, integer programming, decision support system