Sciweavers

2601 search results - page 137 / 521
» Secure Rewarding Schemes
Sort
View
EUROCRYPT
2001
Springer
15 years 7 months ago
How to Convert the Flavor of a Quantum Bit Commitment
In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealin...
Claude Crépeau, Frédéric L&ea...
ICIW
2008
IEEE
15 years 9 months ago
On Secure and Anonymous Buyer-Seller Watermarking Protocol
—Buyer-seller watermarking protocols incorporates digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer b...
Mina Deng, Bart Preneel
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 8 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
GLOBECOM
2008
IEEE
15 years 3 months ago
Secure Location Verification for Vehicular Ad-Hoc Networks
In this paper, we examine one of the security issues in vehicular ad-hoc network (VANETs): position-spoofing attack. We propose a novel Secure Location Verification (SLV) scheme to...
Joo-Han Song, Victor W. S. Wong, Vincent C. M. Leu...
IJHPCN
2008
63views more  IJHPCN 2008»
15 years 3 months ago
On the secure creation, organisation and discovery of topics in distributed publish/subscribe systems
: Publish/Subscribe infrastructures have gained significant traction recently with several specifications such as the Java Message Service (JMS), WS-Eventing and WS-Notification. I...
Shrideep Pallickara, Geoffrey Fox, Harshawardhan G...