Sciweavers

38 search results - page 7 / 8
» fc 2005
Sort
View
FC
2005
Springer
110views Cryptology» more  FC 2005»
13 years 11 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...
FC
2005
Springer
87views Cryptology» more  FC 2005»
13 years 11 months ago
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce
We surveyed 470 Amazon.com merchants regarding their experience, knowledge and perceptions of digitally-signed email. Some of these merchants (93) had been receiving digitally-sign...
Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nor...
FC
2005
Springer
87views Cryptology» more  FC 2005»
13 years 11 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
FC
2003
Springer
111views Cryptology» more  FC 2003»
13 years 10 months ago
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
Abstract. Thanks to their broad international acceptance and availability in high denominations, there is widespread concern that Euro banknotes may provide an attractive new curre...
Ari Juels, Ravikanth Pappu
CSCLP
2005
Springer
13 years 11 months ago
Complexity Analysis of Heuristic CSP Search Algorithms
CSP search algorithms are exponential in the worst-case. A trivial upper bound on the time complexity of CSP search algorithms is O∗ (dn ), where n and d are the number of variab...
Igor Razgon