Sciweavers

2967 search results - page 510 / 594
» Cryptology
Sort
View
FC
2009
Springer
92views Cryptology» more  FC 2009»
15 years 4 months ago
Deterring Online Advertising Fraud through Optimal Payment in Arrears
Online advertisers face substantial difficulty in selecting and supervising small advertising partners: Fraud can be well-hidden, and limited reputation systems reduce accountabili...
Benjamin Edelman
FC
2009
Springer
118views Cryptology» more  FC 2009»
15 years 4 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
FC
2009
Springer
99views Cryptology» more  FC 2009»
15 years 4 months ago
Optical DNA
Abstract. A certificate of authenticity (COA) is an inexpensive physical object with a random and unique structure S which is hard to nearexactly replicate. An inexpensive device ...
Deepak Vijaywargi, Dave Lewis, Darko Kirovski
FC
2009
Springer
109views Cryptology» more  FC 2009»
15 years 4 months ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
IMA
2009
Springer
111views Cryptology» more  IMA 2009»
15 years 4 months ago
Geometric Ideas for Cryptographic Equation Solving in Even Characteristic
Abstract. The GeometricXL algorithm is a geometrically invariant version of the XL algorithm that uses polynomials of a much smaller degree than either a standard Groebner basis al...
Sean Murphy, Maura B. Paterson