Sciweavers

89 search results - page 3 / 18
» How Fair is Your Protocol
Sort
View
ICCSA
2005
Springer
13 years 11 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
IPPS
2005
IEEE
13 years 11 months ago
ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange
1 Electronic fair-exchange protocols have received significant attention from the research community in the recent past. In loose terms, the fair exchange problem is defined as at...
Mudhakar Srivatsa, Li Xiong, Ling Liu
CCS
2005
ACM
13 years 11 months ago
On fairness in simulatability-based cryptographic systems
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its position as one of the fundamental concepts of modern cryptography. Although simula...
Michael Backes, Dennis Hofheinz, Jörn Mü...
HICSS
2000
IEEE
154views Biometrics» more  HICSS 2000»
13 years 10 months ago
Anti-Serendipity: Finding Useless Documents and Similar Documents
The problem of finding your way through a relatively unknown collection of digital documents can be daunting. Such collections sometimes have few categories and little hierarchy, ...
James W. Cooper, John M. Prager
PODC
2004
ACM
13 years 11 months ago
Completely fair SFE and coalition-safe cheap talk
Secure function evaluation (SFE) enables a group of players, by themselves, to evaluate a function on private inputs as securely as if a trusted third party had done it for them. ...
Matt Lepinski, Silvio Micali, Chris Peikert, Abhi ...