Sciweavers

FC
2008
Springer
107views Cryptology» more  FC 2008»
13 years 6 months ago
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Abstract. We examine the structure and outcomes of user participation in PhishTank, a phishing-report collator. Anyone who wishes may submit URLs of suspected phishing websites, an...
Tyler Moore, Richard Clayton
FC
2008
Springer
81views Cryptology» more  FC 2008»
13 years 6 months ago
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
At Oakland 2005, Murdoch and Danezis described an attack on the Tor anonymity service that recovers the nodes in a Tor circuit, but not the client. We observe that in a peer-to-pee...
Jon McLachlan, Nicholas Hopper
FC
2008
Springer
90views Cryptology» more  FC 2008»
13 years 6 months ago
Practical Anonymous Divisible E-Cash from Bounded Accumulators
We present an efficient off-line divisible e-cash scheme which is truly anonymous without a trusted third party. This is the second scheme in the literature which achieves full unl...
Man Ho Au, Willy Susilo, Yi Mu
FC
2008
Springer
105views Cryptology» more  FC 2008»
13 years 6 months ago
ePassport: Securing International Contacts with Contactless Chips
Gildas Avoine, Kassem Kalach, Jean-Jacques Quisqua...
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 6 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
FC
2008
Springer
81views Cryptology» more  FC 2008»
13 years 6 months ago
Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash
The practical advantage expected from transferable e-cash compare to non-transferable is the significant reduction of the interaction number between the bank and the users. However...
Sébastien Canard, Aline Gouget, Jacques Tra...