Sciweavers

FC
2006
Springer
94views Cryptology» more  FC 2006»
15 years 7 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
95
Voted
FC
2006
Springer
108views Cryptology» more  FC 2006»
15 years 7 months ago
A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions
Michael Szydlo
114
Voted
FC
2006
Springer
107views Cryptology» more  FC 2006»
15 years 7 months ago
Efficient Broadcast Encryption Scheme with Log-Key Storage
In this paper, we present a broadcast encryption scheme with efficient transmission cost under the log-key restriction. Given n users and r revoked users, our scheme has the trans...
Yong Ho Hwang, Pil Joong Lee
FC
2006
Springer
97views Cryptology» more  FC 2006»
15 years 7 months ago
Privacy-Protecting Coupon System Revisited
Abstract. At FC'05, Chen et al. introduced an elegant privacy protecting coupon (PPC) system, CESSS05 [13], in which users can purchase multi-coupons and redeem them unlinkabl...
Lan Nguyen
FATES
2006
Springer
15 years 7 months ago
Online Testing with Reinforcement Learning
Margus Veanes, Pritam Roy, Colin Campbell