Sciweavers

45 search results - page 3 / 9
» fc 2010
Sort
View
FC
2010
Springer
209views Cryptology» more  FC 2010»
13 years 9 months ago
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
We introduce the novel notion of Verifiable Encryption of Chameleon Signatures (VECS), and then use it to design a three-round abuse-free optimistic contract signing protocol. Key...
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong...
CCCG
2010
13 years 7 months ago
Range aggregate structures for colored geometric objects
A set of n colored objects (points/hyperboxes) lie in IRd . Each object has a weight associated with it. Given a query orthogonal range q, for each distinct color c of the objects...
Saladi Rahul, Haritha Bellam, Prosenjit Gupta, Kri...
FC
2010
Springer
158views Cryptology» more  FC 2010»
13 years 5 months ago
A Secure and Privacy-Preserving Targeted Ad-System
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods vio...
Elli Androulaki, Steven M. Bellovin
FC
2010
Springer
175views Cryptology» more  FC 2010»
13 years 6 months ago
Cryptographic Cloud Storage
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We...
Seny Kamara, Kristin Lauter
FC
2010
Springer
157views Cryptology» more  FC 2010»
13 years 6 months ago
A Framework for Understanding and Applying Ethical Principles in Network and Security Research
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and a...
Erin Kenneally, Michael Bailey, Douglas Maughan