Sciweavers

348 search results - page 28 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
EUROCRYPT
2001
Springer
15 years 6 months ago
The Bit Security of Paillier's Encryption Scheme and Its Applications
At EuroCrypt’99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N-resi...
Dario Catalano, Rosario Gennaro, Nick Howgrave-Gra...
98
Voted
WECWIS
2005
IEEE
116views ECommerce» more  WECWIS 2005»
15 years 7 months ago
Security and Privacy Using One-Round Zero-Knowledge Proofs
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal wi...
Sultan Almuhammadi, Clifford Neuman
103
Voted
CHI
2007
ACM
16 years 2 months ago
Pictures at the ATM: exploring the usability of multiple graphical passwords
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN)...
Wendy Moncur, Grégory Leplâtre
PERCOM
2003
ACM
16 years 1 months ago
A Pervasive Keyboard - Separating Input from Display
A novel text input for public displays and palmtop computers is presented that separates the input from the display of the edited text. While the public display shows both the edi...
Carsten Magerkurth, Richard Stenzel
ICWS
2009
IEEE
15 years 11 months ago
Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection
Websites serve content both through Web Services as well as through user-viewable webpages. While the consumers of web-services are typically ‘machines’, webpages are meant fo...
Varun Bhagwan, Tyrone Grandison