Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
FC
2008
Springer
96views Cryptology» more  FC 2008»
11 years 6 months ago
An Efficient Anonymous Credential System
Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto
FC
2008
Springer
105views Cryptology» more  FC 2008»
11 years 7 months ago
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
Abstract. We consider general secure function evaluation (SFE) of private functions (PF-SFE). Recall, privacy of functions is often most efficiently achieved by general SFE [18,19,...
Vladimir Kolesnikov, Thomas Schneider 0003
FC
2008
Springer
94views Cryptology» more  FC 2008»
11 years 7 months ago
Fair Traceable Multi-Group Signatures
This paper presents fair traceable multi-group signatures (FTMGS), which have enhanced capabilities, compared to group and traceable signatures, that are important in real world sc...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...
FC
2008
Springer
133views Cryptology» more  FC 2008»
11 years 7 months ago
A Proof of Concept Attack against Norwegian Internet Banking Systems
Abstract. The banking industry in Norway has developed a new security infrastructure for conducting commerce on the Internet. The initiative, called BankID, aims to become a nation...
Yngve Espelid, Lars-Helge Netland, André N....
FC
2008
Springer
102views Cryptology» more  FC 2008»
11 years 7 months ago
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal ...
André N. Klingsheim, Kjell Jørgen Ho...
FC
2008
Springer
121views Cryptology» more  FC 2008»
11 years 7 months ago
Competition and Fraud in Online Advertising Markets
Abstract. An economic model of the online advertising market is presented, focusing on the effect of ad fraud. In the model, the market is comprised of three classes of players: pu...
Bob Mungamuru, Stephen Weis
FC
2008
Springer
97views Cryptology» more  FC 2008»
11 years 7 months ago
OpenPGP-Based Financial Instruments and Dispute Arbitration
In this paper, we present some guidelines for implementing various financial instruments for the purposes of credit and payment, including protocols for commercial transactions, di...
Daniel A. Nagy, Nadzeya V. Shakel
FC
2008
Springer
85views Cryptology» more  FC 2008»
11 years 7 months ago
Countermeasures against Government-Scale Monetary Forgery
Abstract. Physical cash is vulnerable to rising threats, such as large-scale, government-mandated forgeries, that digital cash may protect against more effectively. We study mechan...
Alessandro Acquisti, Nicolas Christin, Bryan Parno...
FC
2008
Springer
134views Cryptology» more  FC 2008»
11 years 7 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
books