Sciweavers

21 search results - page 4 / 5
» fc 2004
Sort
View
CLA
2004
13 years 6 months ago
The Fuzzy Classifier by Concept Localization in a Lattice of Concepts
We discuss in this paper several approaches exploiting a base of concepts organized under a lattice in the Fuzzy Classifier by Concept Localization (FC2L) system. We present the 3F...
Samir Elloumi, Ch. Ben Youssef, Sadok Ben Yahia
FC
2004
Springer
112views Cryptology» more  FC 2004»
13 years 10 months ago
The Vector-Ballot e-Voting Approach
Looking at current cryptographic-based e-voting protocols, one can distinguish three basic design paradigms (or approaches): (a) Mix-Networks based, (b) Homomorphic Encryption base...
Aggelos Kiayias, Moti Yung
FC
2004
Springer
105views Cryptology» more  FC 2004»
13 years 10 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
FC
2004
Springer
89views Cryptology» more  FC 2004»
13 years 10 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eï¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
FC
2006
Springer
129views Cryptology» more  FC 2006»
13 years 8 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig