Sciweavers

31 search results - page 3 / 7
» A Provably Secure Anonymous Buyer-Seller Watermarking Protoc...
Sort
View
CCS
2010
ACM
13 years 5 months ago
Dissent: accountable anonymous group messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
CARDIS
2008
Springer
146views Hardware» more  CARDIS 2008»
13 years 7 months ago
Provably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device. Our goal is...
Mike Burmester, Breno de Medeiros, Rossana Motta
IWSEC
2007
Springer
13 years 11 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
13 years 10 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu
PROVSEC
2009
Springer
13 years 11 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang