Sciweavers

42 search results - page 2 / 9
» Cheating in Visual Cryptography
Sort
View
VIROLOGY
2010
136views more  VIROLOGY 2010»
12 years 12 months ago
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
Jean-Baptiste Bedrune, Eric Filiol, Fréd&ea...
CIG
2005
IEEE
13 years 11 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
EUROCRYPT
2004
Springer
13 years 10 months ago
Dining Cryptographers Revisited
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by Chaum for anonymous message publication. A very attractive feature of the basic D...
Philippe Golle, Ari Juels
ASIACRYPT
2011
Springer
12 years 5 months ago
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge
A fundamental question in cryptography deals with understanding the role that randomness plays in cryptographic protocols and to what extent it is necessary. One particular line o...
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, A...
EUROCRYPT
2007
Springer
13 years 11 months ago
Divisible E-Cash Systems Can Be Truly Anonymous
This paper presents an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value 2L that he can parceled and spend anonymously and unlinkably. ...
Sébastien Canard, Aline Gouget