Sciweavers

152 search results - page 24 / 31
» Anonymous k -Show Credentials
Sort
View
ISPEC
2005
Springer
15 years 3 months ago
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revocation and with simple group setup. A linkable ring signature (LRS) scheme additio...
Patrick P. Tsang, Victor K. Wei
NSPW
2006
ACM
15 years 3 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
ACNS
2005
Springer
124views Cryptology» more  ACNS 2005»
15 years 3 months ago
Building Reliable Mix Networks with Fair Exchange
In this paper we present techniques by which each mix in a mix network can be paid for its services by message senders, in a way that ensures fairness and without sacrificing anon...
Michael K. Reiter, XiaoFeng Wang, Matthew Wright
WDAG
2010
Springer
168views Algorithms» more  WDAG 2010»
14 years 8 months ago
Fast Randomized Test-and-Set and Renaming
Most people believe that renaming is easy: simply choose a name at random; if more than one process selects the same name, then try again. We highlight the issues that occur when t...
Dan Alistarh, Hagit Attiya, Seth Gilbert, Andrei G...
CCS
2009
ACM
15 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...