Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
TRUSTBUS
2005
Springer
11 years 7 months ago
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
Abstract. Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. Most proxy signature schemes have succeeded for proxy delegations and t...
Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee
TRUSTBUS
2005
Springer
11 years 7 months ago
Protection Mechanisms Against Phishing Attacks
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...
Klaus Plößl, Hannes Federrath, Thomas N...
TRUSTBUS
2005
Springer
11 years 7 months ago
An Adaptive Privacy Management System for Data Repositories
Marco Casassa Mont, Siani Pearson
TRUSTBUS
2005
Springer
11 years 7 months ago
Conditional Digital Signatures
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, ...
TRUSTBUS
2005
Springer
11 years 7 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
TRUSTBUS
2005
Springer
11 years 7 months ago
A Multilateral Secure Payment System for Wireless LAN Hotspots
Beginning with the adoption of the de-facto standard for wireless LAN communications IEEE 802.11 in 1999 we can observe a continuous growth of public wireless LAN hotspots that pro...
Stephan Groß, Sabine Lein, Sandra Steinbrech...
TRUSTBUS
2005
Springer
11 years 7 months ago
Privacy Enhanced Technologies: Methods - Markets - Misuse
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the util...
Hannes Federrath
TRUSTBUS
2005
Springer
11 years 7 months ago
Securing Operating System Services Based on Smart Cards
The executions of operating system services based on smart cards allow one to personalize some functionalities of the operating system by using the secret information stored in a s...
Luigi Catuogno, Roberto Gassirà, Michele Ma...
TRUSTBUS
2005
Springer
11 years 7 months ago
Dropout-Tolerant TTP-Free Mental Poker
There is a broad literature on distributed card games over communications networks, collectively known as mental poker. Like in any distributed protocol, avoiding the need for a Tr...
Jordi Castellà-Roca, Francesc Sebé, ...
books